[ 0.001303s] DEBUG ThreadId(01) linkerd_app::env: Only allowing connections targeting `LINKERD2_PROXY_INBOUND_IPS` allowed={10.244.7.14} [ 0.001482s] INFO ThreadId(01) linkerd2_proxy::rt: Using single-threaded proxy runtime [ 0.001552s] DEBUG ThreadId(01) linkerd_app: building app [ 0.001688s] DEBUG ThreadId(01) identity: rustls::anchors: add_parsable_certificates processed 1 valid and 0 invalid certs [ 0.001931s] INFO ThreadId(01) linkerd2_proxy: Admin interface on 0.0.0.0:4191 [ 0.001942s] INFO ThreadId(01) linkerd2_proxy: Inbound interface on 0.0.0.0:4143 [ 0.001944s] INFO ThreadId(01) linkerd2_proxy: Outbound interface on 127.0.0.1:4140 [ 0.001947s] INFO ThreadId(01) linkerd2_proxy: Tap interface on 0.0.0.0:4190 [ 0.001949s] INFO ThreadId(01) linkerd2_proxy: Local identity is janya.multi.serviceaccount.identity.linkerd.cluster.local [ 0.001951s] INFO ThreadId(01) linkerd2_proxy: Identity verified via linkerd-identity-headless.linkerd.svc.cluster.local:8080 (linkerd-identity.linkerd.serviceaccount.identity.linkerd.cluster.local) [ 0.001953s] INFO ThreadId(01) linkerd2_proxy: Destinations resolved via linkerd-dst-headless.linkerd.svc.cluster.local:8086 (linkerd-destination.linkerd.serviceaccount.identity.linkerd.cluster.local) [ 0.001954s] DEBUG ThreadId(01) linkerd_app: spawning daemon thread [ 0.002107s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_dns: Resolving a SRV record name=linkerd-policy.linkerd.svc.cluster.local. [ 0.002151s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::xfer::dns_handle: querying: linkerd-policy.linkerd.svc.cluster.local. SRV [ 0.002192s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::name_server::name_server_pool: sending request: [Query { name: Name("linkerd-policy.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 0.002193s] DEBUG ThreadId(02) daemon: linkerd_app: running admin thread [ 0.002226s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::name_server::name_server: reconnecting: NameServerConfig { socket_addr: 10.0.0.10:53, protocol: Udp, tls_dns_name: None, trust_nx_responses: false, bind_addr: None } [ 0.002237s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::xfer: enqueueing message: [Query { name: Name("linkerd-policy.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 0.002247s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_proxy_identity_client::certify: Identity daemon running [ 0.002259s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_proxy_identity_client::certify: Certifying identity [ 0.002281s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::udp::udp_stream: created socket successfully [ 0.002373s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_dns: Resolving a SRV record name=linkerd-identity-headless.linkerd.svc.cluster.local. [ 0.002395s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_proto::xfer::dns_handle: querying: linkerd-identity-headless.linkerd.svc.cluster.local. SRV [ 0.002416s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_resolver::name_server::name_server_pool: sending request: [Query { name: Name("linkerd-identity-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 0.002449s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_resolver::name_server::name_server: existing connection: NameServerConfig { socket_addr: 10.0.0.10:53, protocol: Udp, tls_dns_name: None, trust_nx_responses: false, bind_addr: None } [ 0.002459s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_proto::xfer: enqueueing message: [Query { name: Name("linkerd-identity-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 0.002518s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_proto::udp::udp_stream: created socket successfully [ 0.003180s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::udp::udp_client_stream: received message id: 29624 [ 0.003185s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_proto::udp::udp_client_stream: received message id: 49522 [ 0.003206s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::error: Response:29624:RD,AA:NoError:1/0/1 [ 0.003214s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::error: Response:29624:RD,AA:NoError:1/0/1 [ 0.003215s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_resolver::error: Response:49522:RD,AA:NoError:1/0/1 time="2022-06-15T21:46:42Z" level=info msg="iptables-save -t nat" time="2022-06-15T21:46:42Z" level=info msg="# Generated by iptables-save v1.8.7 on Wed Jun 15 21:46:42 2022\n*nat\n:PREROUTING ACCEPT [0:0]\n:INPUT ACCEPT [0:0]\n:OUTPUT ACCEPT [0:0]\n:POSTROUTING ACCEPT [0:0]\nCOMMIT\n# Completed on Wed Jun 15 21:46:42 2022\n" [ 0.003237s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_resolver::error: Response:49522:RD,AA:NoError:1/0/1 [ 0.003247s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_dns: ttl=4.999989801s addrs=[10.244.3.16:8090] [ 0.003252s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_dns: ttl=4.999994099s addrs=[10.244.3.54:8080] [ 0.003257s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_proxy_dns_resolve: addrs=[10.244.3.16:8090] name=linkerd-policy.linkerd.svc.cluster.local:8090 [ 0.003277s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_proxy_dns_resolve: addrs=[10.244.3.54:8080] name=linkerd-identity-headless.linkerd.svc.cluster.local:8080 [ 0.003287s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: tower::balance::p2c::service: updating from discover [ 0.003298s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: tower::balance::p2c::service: updating from discover [ 0.003303s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: tower::balance::p2c::service: updating from discover [ 0.003307s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: tower::balance::p2c::service: updating from discover [ 0.003314s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.3.54:8080, Target { addr: 10.244.3.54:8080, server_id: Some(ClientTls { server_id: ServerId(Name("linkerd-identity.linkerd.serviceaccount.identity.linkerd.cluster.local")), alpn: None }) }) time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -N PROXY_INIT_REDIRECT -m comment --comment proxy-init/redirect-common-chain/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -A PROXY_INIT_REDIRECT -p tcp --match multiport --dports 4190,4191,4567,4568 -j RETURN -m comment --comment proxy-init/ignore-port-4190,4191,4567,4568/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -A PROXY_INIT_REDIRECT -p tcp -j REDIRECT --to-port 4143 -m comment --comment proxy-init/redirect-all-incoming-to-proxy-port/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -A PREROUTING -j PROXY_INIT_REDIRECT -m comment --comment proxy-init/install-proxy-init-prerouting/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -N PROXY_INIT_OUTPUT -m comment --comment proxy-init/redirect-common-chain/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -A PROXY_INIT_OUTPUT -m owner --uid-owner 2102 -j RETURN -m comment --comment proxy-init/ignore-proxy-user-id/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -A PROXY_INIT_OUTPUT -o lo -j RETURN -m comment --comment proxy-init/ignore-loopback/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -A PROXY_INIT_OUTPUT -p tcp --match multiport --dports 4567,4568 -j RETURN -m comment --comment proxy-init/ignore-port-4567,4568/1655329602" [ 0.003314s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.3.16:8090, Target { addr: 10.244.3.16:8090, server_id: Some(ClientTls { server_id: ServerId(Name("linkerd-destination.linkerd.serviceaccount.identity.linkerd.cluster.local")), alpn: None }) }) [ 0.003332s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}: linkerd_reconnect: Disconnected backoff=false [ 0.003334s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}: linkerd_reconnect: Disconnected backoff=false [ 0.003335s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}: linkerd_reconnect: Creating service backoff=false time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -A PROXY_INIT_OUTPUT -p tcp -j REDIRECT --to-port 4140 -m comment --comment proxy-init/redirect-all-outgoing-to-proxy-port/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables -t nat -A OUTPUT -j PROXY_INIT_OUTPUT -m comment --comment proxy-init/install-proxy-init-output/1655329602" time="2022-06-15T21:46:42Z" level=info msg="iptables-save -t nat" [ 0.003337s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}: linkerd_reconnect: Creating service backoff=false [ 0.003339s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.3.54:8080 [ 0.003340s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.3.16:8090 [ 0.003411s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: tower::balance::p2c::service: updating from discover [ 0.003413s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: tower::balance::p2c::service: updating from discover [ 0.004032s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41552 keepalive=Some(10s) [ 0.004038s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41116 keepalive=Some(10s) [ 0.004053s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("linkerd-destination.linkerd.serviceaccount.identity.linkerd.cluster.local"))) [ 0.004053s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("linkerd-identity.linkerd.serviceaccount.identity.linkerd.cluster.local"))) time="2022-06-15T21:46:42Z" level=info msg="# Generated by iptables-save v1.8.7 on Wed Jun 15 21:46:42 2022\n*nat\n:PREROUTING ACCEPT [0:0]\n:INPUT ACCEPT [0:0]\n:OUTPUT ACCEPT [0:0]\n:POSTROUTING ACCEPT [0:0]\n:PROXY_INIT_OUTPUT - [0:0]\n:PROXY_INIT_REDIRECT - [0:0]\n-A PREROUTING -m comment --comment \"proxy-init/install-proxy-init-prerouting/1655329602\" -j PROXY_INIT_REDIRECT\n-A OUTPUT -m comment --comment \"proxy-init/install-proxy-init-output/1655329602\" -j PROXY_INIT_OUTPUT\n-A PROXY_INIT_OUTPUT -m owner --uid-owner 2102 -m comment --comment \"proxy-init/ignore-proxy-user-id/1655329602\" -j RETURN\n-A PROXY_INIT_OUTPUT -o lo -m comment --comment \"proxy-init/ignore-loopback/1655329602\" -j RETURN\n-A PROXY_INIT_OUTPUT -p tcp -m multiport --dports 4567,4568 -m comment --comment \"proxy-init/ignore-port-4567,4568/1655329602\" -j RETURN\n-A PROXY_INIT_OUTPUT -p tcp -m comment --comment \"proxy-init/redirect-all-outgoing-to-proxy-port/1655329602\" -j REDIRECT --to-ports 4140\n-A PROXY_INIT_REDIRECT -p tcp -m multiport --dports 4190,4191,4567,4568 -m comment --comment \"proxy-init/ignore-port-4190,4191,4567,4568/1655329602\" -j RETURN\n-A PROXY_INIT_REDIRECT -p tcp -m comment --comment \"proxy-init/redirect-all-incoming-to-proxy-port/1655329602\" -j REDIRECT --to-ports 4143\nCOMMIT\n# Completed on Wed Jun 15 21:46:42 2022\n" [ 0.004081s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: rustls::client::hs: Not resuming any session [ 0.004088s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: rustls::client::hs: Not resuming any session [ 0.004519s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 0.004530s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: rustls::client::tls13: Not resuming [ 0.004551s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 0.004565s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: rustls::client::tls13: Not resuming [ 0.004604s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: rustls::client::tls13: TLS1.3 encrypted extensions: [ServerNameAck] [ 0.004612s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: rustls::client::hs: ALPN protocol is None [ 0.004622s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 0.004631s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: rustls::client::common: Client auth requested but no cert/sigscheme available [ 0.004659s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: rustls::client::tls13: TLS1.3 encrypted extensions: [ServerNameAck] [ 0.004664s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: rustls::client::hs: ALPN protocol is None [ 0.004675s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 0.004688s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: rustls::client::common: Client auth requested but no cert/sigscheme available [ 0.004881s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: linkerd_tls::client: [ 0.004895s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: h2::client: binding client connection [ 0.004912s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: h2::client: client connection bound [ 0.004925s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2: h2::codec::framed_write: send frame=Settings { flags: (0x0), enable_push: 0, initial_window_size: 2097152, max_frame_size: 16384 } [ 0.004952s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: linkerd_tls::client: [ 0.004965s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: h2::client: binding client connection [ 0.004965s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=WindowUpdate { stream_id: StreamId(0), size_increment: 5177345 } [ 0.004998s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: h2::client: client connection bound [ 0.005005s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2: h2::codec::framed_write: send frame=Settings { flags: (0x0), enable_push: 0, initial_window_size: 2097152, max_frame_size: 16384 } [ 0.005043s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: tower::balance::p2c::service: updating from discover [ 0.005049s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=WindowUpdate { stream_id: StreamId(0), size_increment: 5177345 } [ 0.005070s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}: linkerd_reconnect: Connected [ 0.005077s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: tower::buffer::worker: service.ready=true processing request [ 0.005098s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: tower::balance::p2c::service: updating from discover [ 0.005105s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}: linkerd_reconnect: Connected [ 0.005111s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: tower::buffer::worker: service.ready=true processing request [ 0.005116s] DEBUG ThreadId(01) policy:watch{port=9000}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: tower::balance::p2c::service: updating from discover [ 0.005147s] DEBUG ThreadId(01) policy:watch{port=9000}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: tower::balance::p2c::service: updating from discover [ 0.005152s] DEBUG ThreadId(01) policy:watch{port=9000}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: tower::buffer::worker: service.ready=true processing request [ 0.005158s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(1), flags: (0x4: END_HEADERS) } [ 0.005164s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(1), flags: (0x4: END_HEADERS) } [ 0.005184s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(1) } [ 0.005184s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(1) } [ 0.005194s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(1), flags: (0x1: END_STREAM) } [ 0.005224s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(1), flags: (0x1: END_STREAM) } [ 0.005253s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(3), flags: (0x4: END_HEADERS) } [ 0.005268s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(3) } [ 0.005270s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Settings { flags: (0x0), initial_window_size: 65535, max_frame_size: 16384, max_header_list_size: 16777216 } [ 0.005275s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(3), flags: (0x1: END_STREAM) } [ 0.005283s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Settings { flags: (0x1: ACK) } [ 0.005291s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=WindowUpdate { stream_id: StreamId(0), size_increment: 983041 } [ 0.005301s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Settings { flags: (0x1: ACK) } [ 0.005306s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::proto::settings: received settings ACK; applying Settings { flags: (0x0), enable_push: 0, initial_window_size: 2097152, max_frame_size: 16384 } [ 0.005316s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Settings { flags: (0x0), initial_window_size: 65535, max_frame_size: 16384, max_header_list_size: 16777216 } [ 0.005322s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Settings { flags: (0x1: ACK) } [ 0.005328s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=WindowUpdate { stream_id: StreamId(0), size_increment: 983041 } [ 0.005334s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Settings { flags: (0x1: ACK) } [ 0.005339s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::proto::settings: received settings ACK; applying Settings { flags: (0x0), enable_push: 0, initial_window_size: 2097152, max_frame_size: 16384 } [ 0.005960s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(1), flags: (0x4: END_HEADERS) } [ 0.005977s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(3), flags: (0x4: END_HEADERS) } [ 0.005982s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(1) } [ 0.005988s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}:endpoint{addr=10.244.3.16:8090}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 0.006043s] DEBUG ThreadId(01) policy:watch{port=4191}: linkerd_app_inbound::policy::api: policy=ServerPolicy { protocol: Detect { timeout: 10s }, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } [ 0.006078s] DEBUG ThreadId(01) policy:watch{port=9000}: linkerd_app_inbound::policy::api: policy=ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } [ 0.023708s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: linkerd_tls::server: Peeked bytes from TCP stream sz=45 [ 0.023745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.787µs [ 0.023756s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 0.023769s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 0.023818s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: hyper::proto::h1::io: parsed 1 headers [ 0.023825s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: hyper::proto::h1::conn: incoming body is empty [ 0.023844s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=127.0.0.1:58874 [ 0.023929s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: hyper::proto::h1::io: flushed 103 bytes [ 0.029473s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(1), flags: (0x4: END_HEADERS) } [ 0.029508s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(1) } [ 0.029522s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(1), flags: (0x5: END_HEADERS | END_STREAM) } [ 0.029785s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_meshtls_rustls::creds::store: Certified [ 0.029822s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_proxy_identity_client::certify: Identity certified expiry=SystemTime { tv_sec: 1655416023, tv_nsec: 0 } [ 0.029826s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_proxy_identity_client::certify: Waiting to refresh identity sleep=60493.599827924s [ 0.029855s] INFO ThreadId(02) daemon:identity: linkerd_app: Certified identity id=janya.multi.serviceaccount.identity.linkerd.cluster.local [ 0.029872s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=GoAway { error_code: NO_ERROR, last_stream_id: StreamId(0) } [ 0.029880s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: h2::proto::connection: Connection::poll; connection error error=GoAway(b"", NO_ERROR, Library) [ 0.029930s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:endpoint{addr=10.244.3.54:8080}:h2:Connection{peer=Client}: rustls::conn: Sending warning alert CloseNotify [ 1.025164s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: hyper::proto::h1::io: parsed 1 headers [ 1.025189s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: hyper::proto::h1::conn: incoming body is empty [ 1.025201s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=127.0.0.1:58874 [ 1.025309s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: hyper::proto::h1::io: flushed 107 bytes [ 1.025366s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: hyper::proto::h1::conn: read eof [ 1.025415s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1.025450s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=127.0.0.1:58874}: linkerd_app_core::serve: Connection closed [ 5.004513s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_dns: Resolving a SRV record name=linkerd-identity-headless.linkerd.svc.cluster.local. [ 5.004513s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_dns: Resolving a SRV record name=linkerd-policy.linkerd.svc.cluster.local. [ 5.004568s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::xfer::dns_handle: querying: linkerd-policy.linkerd.svc.cluster.local. SRV [ 5.004568s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_proto::xfer::dns_handle: querying: linkerd-identity-headless.linkerd.svc.cluster.local. SRV [ 5.004591s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_resolver::name_server::name_server_pool: sending request: [Query { name: Name("linkerd-identity-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 5.004593s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::name_server::name_server_pool: sending request: [Query { name: Name("linkerd-policy.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 5.004600s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_resolver::name_server::name_server: existing connection: NameServerConfig { socket_addr: 10.0.0.10:53, protocol: Udp, tls_dns_name: None, trust_nx_responses: false, bind_addr: None } [ 5.004613s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_proto::xfer: enqueueing message: [Query { name: Name("linkerd-identity-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 5.004617s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::name_server::name_server: existing connection: NameServerConfig { socket_addr: 10.0.0.10:53, protocol: Udp, tls_dns_name: None, trust_nx_responses: false, bind_addr: None } [ 5.004624s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::xfer: enqueueing message: [Query { name: Name("linkerd-policy.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 5.004688s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::udp::udp_stream: created socket successfully [ 5.004711s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_proto::udp::udp_stream: created socket successfully [ 5.005700s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_proto::udp::udp_client_stream: received message id: 18349 [ 5.005723s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_resolver::error: Response:18349:RD,AA:NoError:1/0/1 [ 5.005730s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: trust_dns_resolver::error: Response:18349:RD,AA:NoError:1/0/1 [ 5.005745s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_dns: ttl=4.999991824s addrs=[10.244.3.54:8080] [ 5.005755s] DEBUG ThreadId(02) identity:identity{server.addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}:controller{addr=linkerd-identity-headless.linkerd.svc.cluster.local:8080}: linkerd_proxy_dns_resolve: addrs=[10.244.3.54:8080] name=linkerd-identity-headless.linkerd.svc.cluster.local:8080 [ 5.005774s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::udp::udp_client_stream: received message id: 10066 [ 5.005794s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::error: Response:10066:RD,AA:NoError:1/0/1 [ 5.005803s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::error: Response:10066:RD,AA:NoError:1/0/1 [ 5.005839s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_dns: ttl=4.999990742s addrs=[10.244.3.16:8090] [ 5.005851s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_proxy_dns_resolve: addrs=[10.244.3.16:8090] name=linkerd-policy.linkerd.svc.cluster.local:8090 [ 5.899391s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 5.899434s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.867µs [ 5.899445s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 5.899559s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 5.899649s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: hyper::proto::h1::io: parsed 4 headers [ 5.899662s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: hyper::proto::h1::conn: incoming body is empty [ 5.899724s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33368 [ 5.899866s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: hyper::proto::h1::io: flushed 107 bytes [ 5.899890s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 5.899907s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33368}: linkerd_app_core::serve: Connection closed [ 7.809803s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}: linkerd_cache: Caching new value key=Accept { orig_dst: OrigDstAddr(10.0.115.236:5432), protocol: () } [ 7.809904s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}: linkerd_app_outbound::discover: Allowing profile lookup [ 7.809943s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}: linkerd_stack::failfast: TCP Server service has become unavailable [ 7.809967s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_dns: Resolving a SRV record name=linkerd-dst-headless.linkerd.svc.cluster.local. [ 7.810004s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::xfer::dns_handle: querying: linkerd-dst-headless.linkerd.svc.cluster.local. SRV [ 7.810029s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::name_server::name_server_pool: sending request: [Query { name: Name("linkerd-dst-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 7.810040s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::name_server::name_server: existing connection: NameServerConfig { socket_addr: 10.0.0.10:53, protocol: Udp, tls_dns_name: None, trust_nx_responses: false, bind_addr: None } [ 7.810045s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::xfer: enqueueing message: [Query { name: Name("linkerd-dst-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 7.810085s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::udp::udp_stream: created socket successfully [ 7.810889s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::udp::udp_client_stream: received message id: 7648 [ 7.810905s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::error: Response:7648:RD,AA:NoError:1/0/1 [ 7.810913s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::error: Response:7648:RD,AA:NoError:1/0/1 [ 7.810928s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_dns: ttl=4.999990743s addrs=[10.244.3.16:8086] [ 7.810941s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_proxy_dns_resolve: addrs=[10.244.3.16:8086] name=linkerd-dst-headless.linkerd.svc.cluster.local:8086 [ 7.810957s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: tower::balance::p2c::service: updating from discover [ 7.810973s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: tower::balance::p2c::service: updating from discover [ 7.810981s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.3.16:8086, Target { addr: 10.244.3.16:8086, server_id: Some(ClientTls { server_id: ServerId(Name("linkerd-destination.linkerd.serviceaccount.identity.linkerd.cluster.local")), alpn: None }) }) [ 7.811006s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}: linkerd_reconnect: Disconnected backoff=false [ 7.811015s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}: linkerd_reconnect: Creating service backoff=false [ 7.811022s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.3.16:8086 [ 7.811090s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: tower::balance::p2c::service: updating from discover [ 7.811650s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60422 keepalive=Some(10s) [ 7.811668s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("linkerd-destination.linkerd.serviceaccount.identity.linkerd.cluster.local"))) [ 7.811700s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: rustls::client::hs: Not resuming any session [ 7.812129s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 7.812147s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: rustls::client::tls13: Not resuming [ 7.812238s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: rustls::client::tls13: TLS1.3 encrypted extensions: [ServerNameAck] [ 7.812249s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: rustls::client::hs: ALPN protocol is None [ 7.812259s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 7.812270s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: rustls::client::common: Attempting client auth [ 7.812581s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: linkerd_tls::client: [ 7.812602s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: h2::client: binding client connection [ 7.812626s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: h2::client: client connection bound [ 7.812637s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2: h2::codec::framed_write: send frame=Settings { flags: (0x0), enable_push: 0, initial_window_size: 2097152, max_frame_size: 16384 } [ 7.812683s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=WindowUpdate { stream_id: StreamId(0), size_increment: 5177345 } [ 7.812737s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: tower::balance::p2c::service: updating from discover [ 7.812753s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}: linkerd_reconnect: Connected [ 7.812763s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: tower::buffer::worker: service.ready=true processing request [ 7.812832s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(1), flags: (0x4: END_HEADERS) } [ 7.812861s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(1) } [ 7.812875s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(1), flags: (0x1: END_STREAM) } [ 7.812968s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Settings { flags: (0x0), initial_window_size: 65535, max_frame_size: 16384, max_header_list_size: 16777216 } [ 7.812982s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Settings { flags: (0x1: ACK) } [ 7.812993s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Settings { flags: (0x1: ACK) } [ 7.812998s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::proto::settings: received settings ACK; applying Settings { flags: (0x0), enable_push: 0, initial_window_size: 2097152, max_frame_size: 16384 } [ 7.813005s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=WindowUpdate { stream_id: StreamId(0), size_increment: 983041 } [ 7.813992s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(1), flags: (0x4: END_HEADERS) } [ 7.814010s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(1) } [ 7.814019s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(1) } [ 7.814029s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(1) } [ 7.814084s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}: linkerd_service_profiles::client: Resolved profile [ 7.814095s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}: linkerd_app_outbound::switch_logical: Profile describes a logical service [ 7.814100s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}: linkerd_app_outbound::http::detect: Skipping HTTP protocol detection [ 7.814106s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_cache: Caching new value key=Logical { protocol: (), profile: .., logical_addr: LogicalAddr(postgres-ha.multi.svc.cluster.local:5432) } [ 7.814147s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 7.814166s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_service_profiles::split: Updating targets=[Target { addr: postgres-ha.multi.svc.cluster.local:5432, weight: 1 }] [ 7.814179s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Resolving dst=postgres-ha.multi.svc.cluster.local:5432 context={"ns":"multi", "nodeName":"aks-agentpool-34908101-vmss000006"} [ 7.814207s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical service has become unavailable [ 7.814216s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: tower::balance::p2c::service: updating from discover [ 7.814226s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: tower::buffer::worker: service.ready=true processing request [ 7.814267s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(3), flags: (0x4: END_HEADERS) } [ 7.814287s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(3) } [ 7.814296s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(3), flags: (0x1: END_STREAM) } [ 7.814744s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(3), flags: (0x4: END_HEADERS) } [ 7.814763s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 7.814805s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 7.814837s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 7.814854s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 7.814889s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 7.814919s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 7.814939s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 7.814946s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 7.815497s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33122 keepalive=Some(10s) [ 7.815511s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 7.815538s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 7.815860s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 7.815870s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 7.815946s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 7.815955s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 7.815962s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 7.815967s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 7.816237s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 7.816261s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 7.816266s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.079394s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 8.079436s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.526µs [ 8.079446s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 8.079454s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 8.079485s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: hyper::proto::h1::io: parsed 4 headers [ 8.079490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: hyper::proto::h1::conn: incoming body is empty [ 8.079502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33386 [ 8.079592s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: hyper::proto::h1::io: flushed 107 bytes [ 8.079612s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 8.079637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33386}: linkerd_app_core::serve: Connection closed [ 8.202316s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.202356s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.202373s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.202389s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.202396s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.203193s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33136 keepalive=Some(10s) [ 8.203211s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.203249s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.203670s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.203684s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.203767s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.203782s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.203791s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.203802s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.204115s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.204138s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.204142s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.238783s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.238816s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.238835s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.238847s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.238853s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.239487s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33140 keepalive=Some(10s) [ 8.239503s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.239538s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.239866s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.239880s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.239943s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.239960s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.239972s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.239980s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.240317s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.240344s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.240349s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.272391s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.272426s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.272445s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.272463s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.272469s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.273109s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33144 keepalive=Some(10s) [ 8.273130s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.273164s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.274268s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.274280s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.274356s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.274367s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.274376s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.274386s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.274687s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.274708s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.274712s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.305914s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.305946s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.305967s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.305980s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.305995s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.306621s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33148 keepalive=Some(10s) [ 8.306643s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.306681s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.307012s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.307024s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.307103s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.307114s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.307120s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.307165s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.307474s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.307495s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.307500s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.334208s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.334237s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.334253s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.334268s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.334277s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.334866s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33156 keepalive=Some(10s) [ 8.334883s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.334919s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.335276s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.335291s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.335366s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.335380s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.335390s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.335400s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.335714s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.335742s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.335749s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.365289s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.365325s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.365344s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.365367s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.365379s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.365930s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33160 keepalive=Some(10s) [ 8.365949s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.365989s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.366328s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.366344s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.366446s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.366458s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.366466s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.366475s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.366858s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.366884s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.366892s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.395253s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.395350s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.395378s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.395402s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.395415s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.396032s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33164 keepalive=Some(10s) [ 8.396056s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.396098s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.396492s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.396510s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.396610s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.396623s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.396632s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.396646s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.397034s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.397070s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.397082s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.425324s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.425359s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.425375s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.425388s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.425394s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.425930s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33168 keepalive=Some(10s) [ 8.425951s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.425978s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.426410s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.426425s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.426512s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.426522s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.426531s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.426542s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.426838s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.426861s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.426868s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.449769s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 8.449805s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 8.449826s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 8.449844s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 8.449861s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 8.450416s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33172 keepalive=Some(10s) [ 8.450436s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 8.450476s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 8.451001s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 8.451019s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 8.451107s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 8.451123s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 8.451150s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 8.451166s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 8.451545s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 8.451575s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 8.451602s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 8.676365s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_tls::server: Peeked bytes from TCP stream sz=260 [ 8.676426s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: rustls::server::hs: decided upon suite TLS13_CHACHA20_POLY1305_SHA256 [ 8.676436s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: rustls::server::tls13::client_hello: Client unwilling to resume, DHE_KE not offered [ 8.677387s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_meshtls_rustls::server: Accepted TLS connection client.id=Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))) alpn=None [ 8.677425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_detect: DetectResult protocol=Some(H2) elapsed=4.658µs [ 8.677434s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_proxy_http::server: Creating HTTP service version=H2 [ 8.677444s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_proxy_http::server: Handling as HTTP version=H2 [ 8.677462s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: h2::codec::framed_write: send frame=Settings { flags: (0x0), initial_window_size: 1048576, max_frame_size: 16384, max_header_list_size: 16777216 } [ 8.677541s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Settings { flags: (0x0), enable_push: 0, initial_window_size: 65535, max_frame_size: 16384 } [ 8.677559s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Settings { flags: (0x1: ACK) } [ 8.677565s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=WindowUpdate { stream_id: StreamId(0), size_increment: 983041 } [ 8.677600s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(1), flags: (0x5: END_HEADERS | END_STREAM) } [ 8.677630s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=WindowUpdate { stream_id: StreamId(0), size_increment: 983041 } [ 8.677668s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 8.678825s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(1), flags: (0x4: END_HEADERS) } [ 8.678856s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(1), flags: (0x1: END_STREAM) } [ 8.678930s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Settings { flags: (0x1: ACK) } [ 8.678944s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::proto::settings: received settings ACK; applying Settings { flags: (0x0), initial_window_size: 1048576, max_frame_size: 16384, max_header_list_size: 16777216 } [ 10.007245s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_dns: Resolving a SRV record name=linkerd-policy.linkerd.svc.cluster.local. [ 10.007303s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::xfer::dns_handle: querying: linkerd-policy.linkerd.svc.cluster.local. SRV [ 10.007315s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::name_server::name_server_pool: sending request: [Query { name: Name("linkerd-policy.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 10.007339s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::name_server::name_server: existing connection: NameServerConfig { socket_addr: 10.0.0.10:53, protocol: Udp, tls_dns_name: None, trust_nx_responses: false, bind_addr: None } [ 10.007357s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::xfer: enqueueing message: [Query { name: Name("linkerd-policy.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 10.007398s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::udp::udp_stream: created socket successfully [ 10.008345s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_proto::udp::udp_client_stream: received message id: 45106 [ 10.008372s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::error: Response:45106:RD,AA:NoError:1/0/1 [ 10.008383s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: trust_dns_resolver::error: Response:45106:RD,AA:NoError:1/0/1 [ 10.008410s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_dns: ttl=4.999988247s addrs=[10.244.3.16:8090] [ 10.008423s] DEBUG ThreadId(01) policy:watch{port=4191}:controller{addr=linkerd-policy.linkerd.svc.cluster.local:8090}: linkerd_proxy_dns_resolve: addrs=[10.244.3.16:8090] name=linkerd-policy.linkerd.svc.cluster.local:8090 [ 10.065082s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 10.065121s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 10.065142s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 10.065157s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 10.065169s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 10.065948s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33222 keepalive=Some(10s) [ 10.065964s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 10.065992s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 10.066348s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 10.066360s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 10.066431s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 10.066441s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 10.066448s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 10.066454s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 10.066749s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 10.066769s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 10.066778s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50272}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 10.338235s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 10.338321s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 10.338340s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 12.811765s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_dns: Resolving a SRV record name=linkerd-dst-headless.linkerd.svc.cluster.local. [ 12.811818s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::xfer::dns_handle: querying: linkerd-dst-headless.linkerd.svc.cluster.local. SRV [ 12.811832s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::name_server::name_server_pool: sending request: [Query { name: Name("linkerd-dst-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 12.811846s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::name_server::name_server: existing connection: NameServerConfig { socket_addr: 10.0.0.10:53, protocol: Udp, tls_dns_name: None, trust_nx_responses: false, bind_addr: None } [ 12.811854s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::xfer: enqueueing message: [Query { name: Name("linkerd-dst-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 12.811941s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::udp::udp_stream: created socket successfully [ 12.812749s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::udp::udp_client_stream: received message id: 35676 [ 12.812788s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::error: Response:35676:RD,AA:NoError:1/0/1 [ 12.812798s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::error: Response:35676:RD,AA:NoError:1/0/1 [ 12.812822s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_dns: ttl=4.999988027s addrs=[10.244.3.16:8086] [ 12.812838s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_proxy_dns_resolve: addrs=[10.244.3.16:8086] name=linkerd-dst-headless.linkerd.svc.cluster.local:8086 [ 17.813658s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_dns: Resolving a SRV record name=linkerd-dst-headless.linkerd.svc.cluster.local. [ 17.813702s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::xfer::dns_handle: querying: linkerd-dst-headless.linkerd.svc.cluster.local. SRV [ 17.813711s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::name_server::name_server_pool: sending request: [Query { name: Name("linkerd-dst-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 17.813721s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::name_server::name_server: existing connection: NameServerConfig { socket_addr: 10.0.0.10:53, protocol: Udp, tls_dns_name: None, trust_nx_responses: false, bind_addr: None } [ 17.813732s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::xfer: enqueueing message: [Query { name: Name("linkerd-dst-headless.linkerd.svc.cluster.local."), query_type: SRV, query_class: IN }] [ 17.813767s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::udp::udp_stream: created socket successfully [ 17.814619s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_proto::udp::udp_client_stream: received message id: 38494 [ 17.814641s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::error: Response:38494:RD,AA:NoError:1/0/1 [ 17.814647s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: trust_dns_resolver::error: Response:38494:RD,AA:NoError:1/0/1 [ 17.814663s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_dns: ttl=4.999991424s addrs=[10.244.3.16:8086] [ 17.814671s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}: linkerd_proxy_dns_resolve: addrs=[10.244.3.16:8086] name=linkerd-dst-headless.linkerd.svc.cluster.local:8086 [ 18.079451s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42298}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 18.079485s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 18.079502s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42298}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42298 [ 18.079537s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.446µs [ 18.079547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 18.079555s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 18.079558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42298}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 18.079596s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: hyper::proto::h1::io: parsed 4 headers [ 18.079610s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: hyper::proto::h1::conn: incoming body is empty [ 18.079622s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33560 [ 18.079661s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42298}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37900 keepalive=None [ 18.079680s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42298}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 18.079720s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: hyper::proto::h1::io: flushed 106 bytes [ 18.079746s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 18.079768s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33560}: linkerd_app_core::serve: Connection closed [ 18.079781s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 18.079791s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.968µs [ 18.079795s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 18.079799s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 18.079814s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: hyper::proto::h1::io: parsed 4 headers [ 18.079817s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: hyper::proto::h1::conn: incoming body is empty [ 18.079822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33562 [ 18.079868s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: hyper::proto::h1::io: flushed 107 bytes [ 18.079890s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 18.079902s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33562}: linkerd_app_core::serve: Connection closed [ 18.246888s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42308}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 4, notify_rx: Notify { state: 5, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc565a7d8), tail: Some(0x7f8fc565a7d8) } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 18.246939s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42308}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42308 [ 18.247000s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42308}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 18.247196s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42298}: linkerd_app_core::serve: Connection closed [ 18.247231s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42308}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37904 keepalive=None [ 18.247238s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42308}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 18.254230s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42308}: linkerd_app_core::serve: Connection closed [ 18.675340s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(3), flags: (0x5: END_HEADERS | END_STREAM) } [ 18.675395s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 18.676348s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(3), flags: (0x4: END_HEADERS) } [ 18.676378s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(3), flags: (0x1: END_STREAM) } [ 20.343328s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 20.343405s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 20.343418s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 23.079167s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 23.079210s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42364 [ 23.079248s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 23.079256s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42366 [ 23.079283s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 23.079358s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 23.079417s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37962 keepalive=None [ 23.079428s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 23.079448s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37964 keepalive=None [ 23.079457s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 23.084059s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}: linkerd_app_core::serve: Connection closed [ 23.084509s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}: linkerd_app_core::serve: Connection closed [ 28.079243s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42426}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 28.079288s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 28.079299s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42426}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42426 [ 28.079323s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.539µs [ 28.079336s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 28.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 28.079354s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42428}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 28.079368s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42428}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42428 [ 28.079385s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: hyper::proto::h1::io: parsed 4 headers [ 28.079390s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: hyper::proto::h1::conn: incoming body is empty [ 28.079399s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42426}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 28.079405s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33688 [ 28.079481s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42428}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 28.079497s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: hyper::proto::h1::io: flushed 107 bytes [ 28.079525s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 28.079555s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33688}: linkerd_app_core::serve: Connection closed [ 28.079553s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42426}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38030 keepalive=None [ 28.079590s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 28.079595s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42426}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 28.079606s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.691µs [ 28.079612s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 28.079619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 28.079625s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42428}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38032 keepalive=None [ 28.079631s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42428}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 28.079639s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: hyper::proto::h1::io: parsed 4 headers [ 28.079643s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: hyper::proto::h1::conn: incoming body is empty [ 28.079651s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33696 [ 28.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: hyper::proto::h1::io: flushed 106 bytes [ 28.079749s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 28.079767s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33696}: linkerd_app_core::serve: Connection closed [ 28.085146s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42426}: linkerd_app_core::serve: Connection closed [ 28.086051s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42428}: linkerd_app_core::serve: Connection closed [ 28.675601s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(5), flags: (0x5: END_HEADERS | END_STREAM) } [ 28.675659s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 28.676559s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(5), flags: (0x4: END_HEADERS) } [ 28.676584s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(5), flags: (0x1: END_STREAM) } [ 30.346786s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 30.346857s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 30.346872s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 33.079971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42492}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 33.080022s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42492}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42492 [ 33.080064s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42494}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 33.080072s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42494}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42494 [ 33.080097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42492}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 33.080168s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42494}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 33.080218s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42492}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38092 keepalive=None [ 33.080229s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42492}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 33.080254s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42494}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38094 keepalive=None [ 33.080259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42494}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 33.084241s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42494}: linkerd_app_core::serve: Connection closed [ 33.084301s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42492}: linkerd_app_core::serve: Connection closed [ 38.079526s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42568}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 38.079575s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42568}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42568 [ 38.079598s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 38.079621s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.834µs [ 38.079622s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42570}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 38.079635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42570}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42570 [ 38.079642s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 38.079663s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 38.079677s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42568}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 38.079700s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: hyper::proto::h1::io: parsed 4 headers [ 38.079709s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: hyper::proto::h1::conn: incoming body is empty [ 38.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33830 [ 38.079766s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42570}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 38.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: hyper::proto::h1::io: flushed 107 bytes [ 38.079834s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42568}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38172 keepalive=None [ 38.079841s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42568}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 38.079840s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 38.079862s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33830}: linkerd_app_core::serve: Connection closed [ 38.079865s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42570}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38174 keepalive=None [ 38.079904s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 38.079914s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.446µs [ 38.079921s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 38.079917s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42570}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 38.079927s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 38.079945s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: hyper::proto::h1::io: parsed 4 headers [ 38.079954s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: hyper::proto::h1::conn: incoming body is empty [ 38.079962s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33838 [ 38.080046s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: hyper::proto::h1::io: flushed 106 bytes [ 38.080079s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 38.080098s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33838}: linkerd_app_core::serve: Connection closed [ 38.083769s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42570}: linkerd_app_core::serve: Connection closed [ 38.083831s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42568}: linkerd_app_core::serve: Connection closed [ 38.674604s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(7), flags: (0x5: END_HEADERS | END_STREAM) } [ 38.674679s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 38.675666s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(7), flags: (0x4: END_HEADERS) } [ 38.675690s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(7), flags: (0x1: END_STREAM) } [ 40.337972s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 40.338046s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 40.338064s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 43.079488s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42642}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 43.079545s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42642}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42642 [ 43.079599s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42644}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 43.079626s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42644}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42644 [ 43.079667s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42642}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 43.079774s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42644}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 43.079843s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42642}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38242 keepalive=None [ 43.079856s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42642}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 43.079890s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42644}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38244 keepalive=None [ 43.079902s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42644}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 43.083875s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42642}: linkerd_app_core::serve: Connection closed [ 43.083934s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42644}: linkerd_app_core::serve: Connection closed [ 48.079309s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42716}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 48.079355s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42716}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42716 [ 48.079356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 48.079407s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.915µs [ 48.079421s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 48.079412s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42718}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 48.079444s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 48.079457s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42718}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42718 [ 48.079490s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42716}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 48.079493s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: hyper::proto::h1::io: parsed 4 headers [ 48.079526s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: hyper::proto::h1::conn: incoming body is empty [ 48.079541s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33978 [ 48.079603s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42718}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 48.079645s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: hyper::proto::h1::io: flushed 106 bytes [ 48.079677s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 48.079684s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42716}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38320 keepalive=None [ 48.079695s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42716}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 48.079704s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33978}: linkerd_app_core::serve: Connection closed [ 48.079721s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42718}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38322 keepalive=None [ 48.079725s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 48.079726s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42718}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 48.079736s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.789µs [ 48.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 48.079745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 48.079767s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: hyper::proto::h1::io: parsed 4 headers [ 48.079771s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: hyper::proto::h1::conn: incoming body is empty [ 48.079777s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33986 [ 48.079839s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: hyper::proto::h1::io: flushed 107 bytes [ 48.079860s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 48.079871s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33986}: linkerd_app_core::serve: Connection closed [ 48.083505s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42716}: linkerd_app_core::serve: Connection closed [ 48.083548s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42718}: linkerd_app_core::serve: Connection closed [ 48.675686s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(9), flags: (0x5: END_HEADERS | END_STREAM) } [ 48.675746s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 48.676754s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(9), flags: (0x4: END_HEADERS) } [ 48.676781s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(9), flags: (0x1: END_STREAM) } [ 53.079039s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42786}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 53.079074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42786}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42786 [ 53.079101s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42784}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 53.079109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42784}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42784 [ 53.079144s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42786}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 53.079218s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42784}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 53.079266s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42786}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38384 keepalive=None [ 53.079273s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42786}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 53.079294s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42784}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38386 keepalive=None [ 53.079298s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42784}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 53.083177s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42784}: linkerd_app_core::serve: Connection closed [ 53.083216s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42786}: linkerd_app_core::serve: Connection closed [ 58.079333s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42864}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 58.079365s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 58.079394s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42864}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42864 [ 58.079414s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.987µs [ 58.079424s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 58.079433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 58.079443s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42866}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 58.079464s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42866}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42866 [ 58.079468s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: hyper::proto::h1::io: parsed 4 headers [ 58.079496s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: hyper::proto::h1::conn: incoming body is empty [ 58.079511s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42864}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 58.079510s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34132 [ 58.079613s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: hyper::proto::h1::io: flushed 107 bytes [ 58.079626s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42866}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 58.079646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 58.079679s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34132}: linkerd_app_core::serve: Connection closed [ 58.079697s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 58.079709s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.418µs [ 58.079715s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 58.079721s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 58.079716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42864}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38466 keepalive=None [ 58.079735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42864}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 58.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: hyper::proto::h1::io: parsed 4 headers [ 58.079743s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: hyper::proto::h1::conn: incoming body is empty [ 58.079748s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34126 [ 58.079756s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42866}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38468 keepalive=None [ 58.079759s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42866}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 58.079800s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: hyper::proto::h1::io: flushed 106 bytes [ 58.079829s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 58.079842s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34126}: linkerd_app_core::serve: Connection closed [ 58.083877s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42866}: linkerd_app_core::serve: Connection closed [ 58.083969s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42864}: linkerd_app_core::serve: Connection closed [ 58.674794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(11), flags: (0x5: END_HEADERS | END_STREAM) } [ 58.674853s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 58.676032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(11), flags: (0x4: END_HEADERS) } [ 58.676060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(11), flags: (0x1: END_STREAM) } [ 63.079436s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42930}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 63.079482s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42930}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42930 [ 63.079521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42928}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 63.079533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42928}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42928 [ 63.079558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42930}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 63.079634s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42928}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 63.079702s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42930}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38528 keepalive=None [ 63.079711s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42930}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 63.079736s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42928}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38530 keepalive=None [ 63.079743s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42928}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 63.083662s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42930}: linkerd_app_core::serve: Connection closed [ 63.083719s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42928}: linkerd_app_core::serve: Connection closed [ 68.079393s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43018}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 68.079442s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43018}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43018 [ 68.079449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 68.079478s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.596µs [ 68.079489s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 68.079496s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 68.079491s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43010}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 68.079519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43010}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43010 [ 68.079544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: hyper::proto::h1::io: parsed 4 headers [ 68.079549s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: hyper::proto::h1::conn: incoming body is empty [ 68.079559s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43018}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 68.079559s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34274 [ 68.079627s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: hyper::proto::h1::io: flushed 106 bytes [ 68.079639s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43010}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 68.079652s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 68.079674s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34274}: linkerd_app_core::serve: Connection closed [ 68.079687s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 68.079698s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.538µs [ 68.079703s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 68.079708s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 68.079707s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43018}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38614 keepalive=None [ 68.079718s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43018}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 68.079730s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: hyper::proto::h1::io: parsed 4 headers [ 68.079734s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: hyper::proto::h1::conn: incoming body is empty [ 68.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43010}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38616 keepalive=None [ 68.079746s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43010}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 68.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34272 [ 68.079851s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: hyper::proto::h1::io: flushed 107 bytes [ 68.079875s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 68.079893s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34272}: linkerd_app_core::serve: Connection closed [ 68.084007s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43010}: linkerd_app_core::serve: Connection closed [ 68.084058s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43018}: linkerd_app_core::serve: Connection closed [ 68.675441s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(13), flags: (0x5: END_HEADERS | END_STREAM) } [ 68.675502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 68.676687s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(13), flags: (0x4: END_HEADERS) } [ 68.676712s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(13), flags: (0x1: END_STREAM) } [ 70.338236s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 70.338306s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 70.338320s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 73.079280s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43094}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 73.079329s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43094}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43094 [ 73.079369s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43092}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 73.079389s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43092}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43092 [ 73.079418s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43094}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 73.079505s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43092}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 73.079602s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43094}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38692 keepalive=None [ 73.079609s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43094}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 73.079658s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43092}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38694 keepalive=None [ 73.079665s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43092}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 73.083579s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43094}: linkerd_app_core::serve: Connection closed [ 73.084566s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43092}: linkerd_app_core::serve: Connection closed [ 78.079285s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43168}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 78.079324s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 78.079346s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43168}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43168 [ 78.079373s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.908µs [ 78.079391s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 78.079405s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 78.079402s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43170}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 78.079424s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43170}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43170 [ 78.079447s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: hyper::proto::h1::io: parsed 4 headers [ 78.079460s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: hyper::proto::h1::conn: incoming body is empty [ 78.079464s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43168}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 78.079475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34438 [ 78.079566s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43170}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 78.079571s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: hyper::proto::h1::io: flushed 107 bytes [ 78.079603s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 78.079628s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34438}: linkerd_app_core::serve: Connection closed [ 78.079644s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 78.079641s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43168}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38772 keepalive=None [ 78.079679s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43168}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 78.079677s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.388µs [ 78.079687s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 78.079694s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 78.079705s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43170}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38774 keepalive=None [ 78.079710s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43170}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 78.079712s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: hyper::proto::h1::io: parsed 4 headers [ 78.079716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: hyper::proto::h1::conn: incoming body is empty [ 78.079723s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34430 [ 78.079790s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: hyper::proto::h1::io: flushed 106 bytes [ 78.079815s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 78.079831s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34430}: linkerd_app_core::serve: Connection closed [ 78.083272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43168}: linkerd_app_core::serve: Connection closed [ 78.084526s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43170}: linkerd_app_core::serve: Connection closed [ 78.675060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(15), flags: (0x5: END_HEADERS | END_STREAM) } [ 78.675114s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 78.676142s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(15), flags: (0x4: END_HEADERS) } [ 78.676170s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(15), flags: (0x1: END_STREAM) } [ 80.346768s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 80.346840s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 80.346850s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 83.079177s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43232}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 83.079217s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43232}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43232 [ 83.079255s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43234}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 83.079265s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43234}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43234 [ 83.079288s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 83.079369s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 83.079434s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38832 keepalive=None [ 83.079449s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43232}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 83.079467s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38834 keepalive=None [ 83.079473s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43234}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 83.083508s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43232}: linkerd_app_core::serve: Connection closed [ 83.083567s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43234}: linkerd_app_core::serve: Connection closed [ 88.079890s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43296}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 88.079925s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 88.079949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43296}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43296 [ 88.079973s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.684µs [ 88.079982s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 88.079988s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 88.080002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43294}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 88.080014s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: hyper::proto::h1::io: parsed 4 headers [ 88.080022s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43294}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43294 [ 88.080026s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: hyper::proto::h1::conn: incoming body is empty [ 88.080039s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34558 [ 88.080048s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43296}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 88.080133s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: hyper::proto::h1::io: flushed 106 bytes [ 88.080161s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43294}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 88.080165s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 88.080185s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34558}: linkerd_app_core::serve: Connection closed [ 88.080213s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 88.080223s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.627µs [ 88.080225s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43296}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38898 keepalive=None [ 88.080241s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43296}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 88.080229s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 88.080254s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 88.080264s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43294}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38900 keepalive=None [ 88.080275s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43294}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 88.080276s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: hyper::proto::h1::io: parsed 4 headers [ 88.080281s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: hyper::proto::h1::conn: incoming body is empty [ 88.080288s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34564 [ 88.080356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: hyper::proto::h1::io: flushed 107 bytes [ 88.080378s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 88.080408s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34564}: linkerd_app_core::serve: Connection closed [ 88.083669s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43294}: linkerd_app_core::serve: Connection closed [ 88.083722s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43296}: linkerd_app_core::serve: Connection closed [ 88.675008s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(17), flags: (0x5: END_HEADERS | END_STREAM) } [ 88.675071s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 88.676168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(17), flags: (0x4: END_HEADERS) } [ 88.676194s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(17), flags: (0x1: END_STREAM) } [ 93.079681s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43358}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 93.079718s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43358}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43358 [ 93.079755s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43360}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 93.079771s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43360}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43360 [ 93.079811s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43358}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 93.079906s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43360}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 93.079983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43358}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38958 keepalive=None [ 93.079996s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43358}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 93.080021s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43360}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:38960 keepalive=None [ 93.080030s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43360}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 93.083799s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43358}: linkerd_app_core::serve: Connection closed [ 93.084489s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43360}: linkerd_app_core::serve: Connection closed [ 98.079273s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43436}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 98.079328s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43436}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43436 [ 98.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 98.079373s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.789µs [ 98.079383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 98.079382s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43434}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 98.079391s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 98.079414s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43434}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43434 [ 98.079447s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43436}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 98.079450s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: hyper::proto::h1::io: parsed 4 headers [ 98.079483s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: hyper::proto::h1::conn: incoming body is empty [ 98.079497s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34696 [ 98.079559s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43434}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 98.079602s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: hyper::proto::h1::io: flushed 106 bytes [ 98.079631s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 98.079644s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43436}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39038 keepalive=None [ 98.079652s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43436}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 98.079654s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34696}: linkerd_app_core::serve: Connection closed [ 98.079663s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 98.079673s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.386µs [ 98.079674s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43434}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39040 keepalive=None [ 98.079677s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 98.079678s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43434}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 98.079684s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 98.079701s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: hyper::proto::h1::io: parsed 4 headers [ 98.079704s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: hyper::proto::h1::conn: incoming body is empty [ 98.079710s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34698 [ 98.079788s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: hyper::proto::h1::io: flushed 107 bytes [ 98.079809s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 98.079825s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34698}: linkerd_app_core::serve: Connection closed [ 98.083394s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43434}: linkerd_app_core::serve: Connection closed [ 98.084156s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43436}: linkerd_app_core::serve: Connection closed [ 98.675656s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(19), flags: (0x5: END_HEADERS | END_STREAM) } [ 98.675712s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 98.676726s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(19), flags: (0x4: END_HEADERS) } [ 98.676753s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(19), flags: (0x1: END_STREAM) } [ 103.079694s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43516}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 103.079738s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43516}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43516 [ 103.079778s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43514}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 103.079795s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43514}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43514 [ 103.079834s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43516}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 103.079918s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43514}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 103.079977s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43516}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39114 keepalive=None [ 103.079988s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43516}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 103.080005s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43514}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39116 keepalive=None [ 103.080010s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43514}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 103.083697s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43514}: linkerd_app_core::serve: Connection closed [ 103.083744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43516}: linkerd_app_core::serve: Connection closed [ 108.079932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43590}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 108.079963s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 108.079982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43590}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43590 [ 108.080003s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.084µs [ 108.080012s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 108.080018s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 108.080030s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43584}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 108.080046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43584}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43584 [ 108.080052s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: hyper::proto::h1::io: parsed 4 headers [ 108.080057s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: hyper::proto::h1::conn: incoming body is empty [ 108.080073s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34850 [ 108.080079s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43590}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 108.080164s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: hyper::proto::h1::io: flushed 106 bytes [ 108.080184s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 108.080190s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 108.080216s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34850}: linkerd_app_core::serve: Connection closed [ 108.080233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 108.080245s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.638µs [ 108.080253s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43590}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39186 keepalive=None [ 108.080257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 108.080260s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43590}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 108.080262s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 108.080278s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: hyper::proto::h1::io: parsed 4 headers [ 108.080296s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: hyper::proto::h1::conn: incoming body is empty [ 108.080280s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39188 keepalive=None [ 108.080302s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43584}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 108.080303s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34846 [ 108.080356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: hyper::proto::h1::io: flushed 107 bytes [ 108.080383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 108.080403s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34846}: linkerd_app_core::serve: Connection closed [ 108.083744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43584}: linkerd_app_core::serve: Connection closed [ 108.083784s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43590}: linkerd_app_core::serve: Connection closed [ 108.674740s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(21), flags: (0x5: END_HEADERS | END_STREAM) } [ 108.674801s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 108.676055s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(21), flags: (0x4: END_HEADERS) } [ 108.676082s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(21), flags: (0x1: END_STREAM) } [ 113.079378s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43650}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 113.079425s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43650}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43650 [ 113.079469s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43652}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 113.079478s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43652}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43652 [ 113.079503s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43650}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 113.079583s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43652}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 113.079655s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43650}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39250 keepalive=None [ 113.079662s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43650}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 113.079682s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43652}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39252 keepalive=None [ 113.079695s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43652}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 113.083638s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43650}: linkerd_app_core::serve: Connection closed [ 113.083694s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43652}: linkerd_app_core::serve: Connection closed [ 118.079705s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43726}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 118.079744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43726}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43726 [ 118.079760s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 118.079785s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.203µs [ 118.079794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 118.079817s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 118.079792s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43728}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 118.079825s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43728}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43728 [ 118.079867s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43726}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 118.079867s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: hyper::proto::h1::io: parsed 4 headers [ 118.079884s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: hyper::proto::h1::conn: incoming body is empty [ 118.079902s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34988 [ 118.079959s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43728}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 118.079987s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: hyper::proto::h1::io: flushed 107 bytes [ 118.080019s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 118.080028s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43726}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39330 keepalive=None [ 118.080038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43726}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 118.080040s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34988}: linkerd_app_core::serve: Connection closed [ 118.080079s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 118.080083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43728}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39332 keepalive=None [ 118.080090s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43728}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 118.080091s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.238µs [ 118.080095s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 118.080101s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 118.080117s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: hyper::proto::h1::io: parsed 4 headers [ 118.080125s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: hyper::proto::h1::conn: incoming body is empty [ 118.080130s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:34996 [ 118.080179s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: hyper::proto::h1::io: flushed 106 bytes [ 118.080197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 118.080215s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:34996}: linkerd_app_core::serve: Connection closed [ 118.083696s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43726}: linkerd_app_core::serve: Connection closed [ 118.083752s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43728}: linkerd_app_core::serve: Connection closed [ 118.674852s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(23), flags: (0x5: END_HEADERS | END_STREAM) } [ 118.674922s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 118.675885s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(23), flags: (0x4: END_HEADERS) } [ 118.675919s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(23), flags: (0x1: END_STREAM) } [ 123.079812s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43798}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 123.079867s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43798}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43798 [ 123.079910s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43796}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 123.079921s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43796}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43796 [ 123.079949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43798}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 123.080032s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43796}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 123.080154s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43798}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39396 keepalive=None [ 123.080165s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43798}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 123.080183s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43796}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39398 keepalive=None [ 123.080185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43796}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 123.084059s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43798}: linkerd_app_core::serve: Connection closed [ 123.084109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43796}: linkerd_app_core::serve: Connection closed [ 128.079173s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43872}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 128.079219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43872}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43872 [ 128.079233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 128.079259s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.586µs [ 128.079264s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43874}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 128.079275s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 128.079276s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43874}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43874 [ 128.079283s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 128.079306s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43872}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 128.079315s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: hyper::proto::h1::io: parsed 4 headers [ 128.079319s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: hyper::proto::h1::conn: incoming body is empty [ 128.079331s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35134 [ 128.079391s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43874}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 128.079406s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: hyper::proto::h1::io: flushed 107 bytes [ 128.079426s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 128.079448s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35134}: linkerd_app_core::serve: Connection closed [ 128.079453s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43872}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39474 keepalive=None [ 128.079458s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 128.079461s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43872}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 128.079468s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.747µs [ 128.079473s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 128.079477s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 128.079484s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43874}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39476 keepalive=None [ 128.079489s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43874}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 128.079491s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: hyper::proto::h1::io: parsed 4 headers [ 128.079494s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: hyper::proto::h1::conn: incoming body is empty [ 128.079499s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35136 [ 128.079548s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: hyper::proto::h1::io: flushed 106 bytes [ 128.079569s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 128.079582s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35136}: linkerd_app_core::serve: Connection closed [ 128.083211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43874}: linkerd_app_core::serve: Connection closed [ 128.083269s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43872}: linkerd_app_core::serve: Connection closed [ 128.675260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(25), flags: (0x5: END_HEADERS | END_STREAM) } [ 128.675320s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 128.676335s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(25), flags: (0x4: END_HEADERS) } [ 128.676361s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(25), flags: (0x1: END_STREAM) } [ 130.341623s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 130.341692s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 130.341701s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 133.079029s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43952}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 133.079085s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43952}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43952 [ 133.079156s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43950}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 133.079170s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43950}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:43950 [ 133.079201s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43952}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 133.079296s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43950}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 133.079383s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43952}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39550 keepalive=None [ 133.079396s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43952}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 133.079439s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43950}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39552 keepalive=None [ 133.079446s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43950}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 133.083052s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43952}: linkerd_app_core::serve: Connection closed [ 133.083100s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:43950}: linkerd_app_core::serve: Connection closed [ 138.079854s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44028}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 138.079901s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44028}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44028 [ 138.079907s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 138.079935s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.857µs [ 138.079948s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 138.079948s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44026}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 138.079957s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 138.079956s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44026}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44026 [ 138.080000s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44028}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 138.080003s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: hyper::proto::h1::io: parsed 4 headers [ 138.080030s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: hyper::proto::h1::conn: incoming body is empty [ 138.080043s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35296 [ 138.080096s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44026}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 138.080134s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: hyper::proto::h1::io: flushed 106 bytes [ 138.080157s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44028}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39630 keepalive=None [ 138.080165s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44028}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 138.080162s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 138.080185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44026}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39632 keepalive=None [ 138.080190s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44026}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 138.080218s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35296}: linkerd_app_core::serve: Connection closed [ 138.080231s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 138.080243s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.909µs [ 138.080253s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 138.080259s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 138.080280s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: hyper::proto::h1::io: parsed 4 headers [ 138.080291s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: hyper::proto::h1::conn: incoming body is empty [ 138.080298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35290 [ 138.080371s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: hyper::proto::h1::io: flushed 107 bytes [ 138.080399s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 138.080416s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35290}: linkerd_app_core::serve: Connection closed [ 138.083986s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44026}: linkerd_app_core::serve: Connection closed [ 138.084032s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44028}: linkerd_app_core::serve: Connection closed [ 138.675527s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(27), flags: (0x5: END_HEADERS | END_STREAM) } [ 138.675585s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 138.676626s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(27), flags: (0x4: END_HEADERS) } [ 138.676674s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(27), flags: (0x1: END_STREAM) } [ 140.350544s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 140.350609s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 140.350621s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 143.079751s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44100}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 143.079789s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44100}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44100 [ 143.079832s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44098}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 143.079859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44098}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44098 [ 143.079891s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44100}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 143.079981s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44098}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 143.080078s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44100}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39698 keepalive=None [ 143.080097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44100}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 143.080126s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44098}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39700 keepalive=None [ 143.080130s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44098}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 143.083897s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44100}: linkerd_app_core::serve: Connection closed [ 143.083944s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44098}: linkerd_app_core::serve: Connection closed [ 148.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44162}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 148.079502s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44162}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44162 [ 148.079522s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 148.079550s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.588µs [ 148.079551s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44164}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 148.079560s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 148.079571s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44164}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44164 [ 148.079588s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 148.079614s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: hyper::proto::h1::io: parsed 4 headers [ 148.079625s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: hyper::proto::h1::conn: incoming body is empty [ 148.079616s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44162}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 148.079636s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35426 [ 148.079703s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: hyper::proto::h1::io: flushed 107 bytes [ 148.079715s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44164}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 148.079729s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 148.079752s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35426}: linkerd_app_core::serve: Connection closed [ 148.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 148.079772s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.527µs [ 148.079776s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 148.079780s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 148.079782s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44162}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39768 keepalive=None [ 148.079791s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44162}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 148.079796s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: hyper::proto::h1::io: parsed 4 headers [ 148.079800s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: hyper::proto::h1::conn: incoming body is empty [ 148.079808s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35424 [ 148.079812s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44164}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39770 keepalive=None [ 148.079815s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44164}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 148.079856s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: hyper::proto::h1::io: flushed 106 bytes [ 148.079871s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 148.079884s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35424}: linkerd_app_core::serve: Connection closed [ 148.083439s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44164}: linkerd_app_core::serve: Connection closed [ 148.083494s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44162}: linkerd_app_core::serve: Connection closed [ 148.675425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(29), flags: (0x5: END_HEADERS | END_STREAM) } [ 148.675475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 148.676433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(29), flags: (0x4: END_HEADERS) } [ 148.676458s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(29), flags: (0x1: END_STREAM) } [ 150.339266s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 150.339339s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 150.339353s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 153.079171s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44232}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 153.079213s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44232}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44232 [ 153.079253s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44234}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 153.079267s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44234}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44234 [ 153.079304s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 153.079385s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 153.079477s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39832 keepalive=None [ 153.079508s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44232}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 153.079534s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39834 keepalive=None [ 153.079548s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44234}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 153.082973s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44234}: linkerd_app_core::serve: Connection closed [ 153.083019s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44232}: linkerd_app_core::serve: Connection closed [ 158.079155s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44302}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 158.079181s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 158.079210s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44302}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44302 [ 158.079230s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.087µs [ 158.079240s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 158.079260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 158.079258s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44304}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 158.079273s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44304}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44304 [ 158.079300s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: hyper::proto::h1::io: parsed 4 headers [ 158.079306s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44302}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 158.079310s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: hyper::proto::h1::conn: incoming body is empty [ 158.079322s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35564 [ 158.079390s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44304}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 158.079396s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: hyper::proto::h1::io: flushed 106 bytes [ 158.079439s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 158.079463s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35564}: linkerd_app_core::serve: Connection closed [ 158.079463s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44302}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39902 keepalive=None [ 158.079487s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 158.079504s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44302}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 158.079531s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.593µs [ 158.079544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 158.079547s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44304}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39904 keepalive=None [ 158.079552s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 158.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44304}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 158.079576s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: hyper::proto::h1::io: parsed 4 headers [ 158.079578s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: hyper::proto::h1::conn: incoming body is empty [ 158.079584s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35566 [ 158.079646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: hyper::proto::h1::io: flushed 107 bytes [ 158.079668s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 158.079681s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35566}: linkerd_app_core::serve: Connection closed [ 158.083108s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44302}: linkerd_app_core::serve: Connection closed [ 158.083186s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44304}: linkerd_app_core::serve: Connection closed [ 158.674765s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(31), flags: (0x5: END_HEADERS | END_STREAM) } [ 158.674815s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 158.675851s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(31), flags: (0x4: END_HEADERS) } [ 158.675878s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(31), flags: (0x1: END_STREAM) } [ 160.338183s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 160.338255s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 160.338264s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 163.079042s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44372}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 163.079087s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44372}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44372 [ 163.079152s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44374}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 163.079164s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44374}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44374 [ 163.079193s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44372}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 163.079279s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44374}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 163.079331s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44372}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39972 keepalive=None [ 163.079346s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44372}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 163.079363s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44374}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:39974 keepalive=None [ 163.079367s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44374}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 163.082931s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44374}: linkerd_app_core::serve: Connection closed [ 163.082981s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44372}: linkerd_app_core::serve: Connection closed [ 168.079220s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44440}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 168.079259s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 168.079265s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44440}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44440 [ 168.079289s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.758µs [ 168.079300s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 168.079308s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 168.079321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44442}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 168.079331s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44442}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44442 [ 168.079335s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: hyper::proto::h1::io: parsed 4 headers [ 168.079340s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: hyper::proto::h1::conn: incoming body is empty [ 168.079356s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44440}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 168.079364s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35702 [ 168.079448s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44442}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 168.079453s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: hyper::proto::h1::io: flushed 107 bytes [ 168.079479s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 168.079502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35702}: linkerd_app_core::serve: Connection closed [ 168.079512s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 168.079513s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44440}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40044 keepalive=None [ 168.079519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44440}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 168.079520s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.106µs [ 168.079524s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 168.079527s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 168.079535s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44442}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40046 keepalive=None [ 168.079537s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44442}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 168.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: hyper::proto::h1::io: parsed 4 headers [ 168.079541s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: hyper::proto::h1::conn: incoming body is empty [ 168.079545s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35710 [ 168.079583s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: hyper::proto::h1::io: flushed 106 bytes [ 168.079593s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 168.079602s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35710}: linkerd_app_core::serve: Connection closed [ 168.083055s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44440}: linkerd_app_core::serve: Connection closed [ 168.083103s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44442}: linkerd_app_core::serve: Connection closed [ 168.674951s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(33), flags: (0x5: END_HEADERS | END_STREAM) } [ 168.675016s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 168.675967s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(33), flags: (0x4: END_HEADERS) } [ 168.675999s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(33), flags: (0x1: END_STREAM) } [ 170.354952s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 170.355016s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 170.355026s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 173.079842s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44506}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 173.079888s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44506}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44506 [ 173.079933s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44504}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 173.079951s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44504}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44504 [ 173.079982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44506}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 173.080066s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44504}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 173.080126s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44506}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40104 keepalive=None [ 173.080139s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44506}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 173.080163s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44504}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40106 keepalive=None [ 173.080179s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44504}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 173.084153s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44504}: linkerd_app_core::serve: Connection closed [ 173.085141s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44506}: linkerd_app_core::serve: Connection closed [ 178.079016s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44584}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 178.079054s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 178.079077s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44584}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44584 [ 178.079101s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.448µs [ 178.079115s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 178.079115s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44582}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 178.079121s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 178.079142s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44582}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44582 [ 178.079180s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 178.079182s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: hyper::proto::h1::io: parsed 4 headers [ 178.079198s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: hyper::proto::h1::conn: incoming body is empty [ 178.079208s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35844 [ 178.079262s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 178.079302s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: hyper::proto::h1::io: flushed 106 bytes [ 178.079324s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40186 keepalive=None [ 178.079332s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44584}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 178.079334s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 178.079356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35844}: linkerd_app_core::serve: Connection closed [ 178.079355s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40188 keepalive=None [ 178.079377s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44582}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 178.079378s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 178.079388s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.657µs [ 178.079397s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 178.079403s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 178.079418s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: hyper::proto::h1::io: parsed 4 headers [ 178.079426s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: hyper::proto::h1::conn: incoming body is empty [ 178.079432s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35852 [ 178.079477s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: hyper::proto::h1::io: flushed 107 bytes [ 178.079491s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 178.079502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35852}: linkerd_app_core::serve: Connection closed [ 178.082905s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44582}: linkerd_app_core::serve: Connection closed [ 178.082960s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44584}: linkerd_app_core::serve: Connection closed [ 178.674628s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(35), flags: (0x5: END_HEADERS | END_STREAM) } [ 178.674689s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 178.675729s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(35), flags: (0x4: END_HEADERS) } [ 178.675758s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(35), flags: (0x1: END_STREAM) } [ 180.342999s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 180.343075s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 180.343093s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 183.079299s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44650}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 183.079354s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44650}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44650 [ 183.079411s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44652}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 183.079427s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44652}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44652 [ 183.079468s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44650}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 183.079587s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44652}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 183.079659s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44650}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40250 keepalive=None [ 183.079666s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44650}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 183.079694s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44652}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40252 keepalive=None [ 183.079705s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44652}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 183.083425s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44652}: linkerd_app_core::serve: Connection closed [ 183.083482s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44650}: linkerd_app_core::serve: Connection closed [ 188.079702s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44730}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 188.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 188.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44730}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44730 [ 188.079767s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.307µs [ 188.079776s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 188.079783s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 188.079779s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44732}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 188.079787s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44732}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44732 [ 188.079812s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44730}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 188.079818s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: hyper::proto::h1::io: parsed 4 headers [ 188.079823s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: hyper::proto::h1::conn: incoming body is empty [ 188.079837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35992 [ 188.079887s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44732}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 188.079919s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: hyper::proto::h1::io: flushed 106 bytes [ 188.079946s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 188.079946s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44730}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40330 keepalive=None [ 188.079953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44730}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 188.079965s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35992}: linkerd_app_core::serve: Connection closed [ 188.079975s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44732}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40332 keepalive=None [ 188.079980s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44732}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 188.079982s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 188.079993s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.969µs [ 188.080001s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 188.080006s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 188.080019s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: hyper::proto::h1::io: parsed 4 headers [ 188.080026s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: hyper::proto::h1::conn: incoming body is empty [ 188.080031s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:35996 [ 188.080075s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: hyper::proto::h1::io: flushed 107 bytes [ 188.080087s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 188.080101s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:35996}: linkerd_app_core::serve: Connection closed [ 188.083630s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44732}: linkerd_app_core::serve: Connection closed [ 188.083689s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44730}: linkerd_app_core::serve: Connection closed [ 188.674539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(37), flags: (0x5: END_HEADERS | END_STREAM) } [ 188.674590s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 188.675513s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(37), flags: (0x4: END_HEADERS) } [ 188.675539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(37), flags: (0x1: END_STREAM) } [ 190.342457s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 190.342538s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 190.342548s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 193.079895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44806}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 193.079942s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44806}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44806 [ 193.079983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44808}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 193.079994s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44808}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44808 [ 193.080018s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44806}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 193.080089s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44808}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 193.080143s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44806}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40406 keepalive=None [ 193.080150s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44806}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 193.080166s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44808}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40408 keepalive=None [ 193.080168s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44808}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 193.083771s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44806}: linkerd_app_core::serve: Connection closed [ 193.083913s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44808}: linkerd_app_core::serve: Connection closed [ 198.078959s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44882}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 198.079008s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44882}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44882 [ 198.079016s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 198.079038s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.524µs [ 198.079047s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 198.079055s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 198.079053s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44886}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 198.079065s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44886}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44886 [ 198.079087s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: hyper::proto::h1::io: parsed 4 headers [ 198.079092s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44882}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 198.079096s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: hyper::proto::h1::conn: incoming body is empty [ 198.079107s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36148 [ 198.079191s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44886}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 198.079197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: hyper::proto::h1::io: flushed 107 bytes [ 198.079233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 198.079252s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36148}: linkerd_app_core::serve: Connection closed [ 198.079262s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 198.079263s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44882}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40484 keepalive=None [ 198.079269s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44882}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 198.079271s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.366µs [ 198.079274s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 198.079279s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 198.079285s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44886}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40486 keepalive=None [ 198.079305s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44886}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 198.079291s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: hyper::proto::h1::io: parsed 4 headers [ 198.079315s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: hyper::proto::h1::conn: incoming body is empty [ 198.079328s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36144 [ 198.079425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: hyper::proto::h1::io: flushed 106 bytes [ 198.079453s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 198.079467s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36144}: linkerd_app_core::serve: Connection closed [ 198.082759s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44886}: linkerd_app_core::serve: Connection closed [ 198.082894s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44882}: linkerd_app_core::serve: Connection closed [ 198.675274s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(39), flags: (0x5: END_HEADERS | END_STREAM) } [ 198.675322s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 198.676140s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(39), flags: (0x4: END_HEADERS) } [ 198.676165s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(39), flags: (0x1: END_STREAM) } [ 200.344562s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 200.344640s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 200.344653s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 203.079540s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44948}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 203.079577s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44948}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44948 [ 203.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44950}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 203.079629s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44950}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:44950 [ 203.079656s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44948}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 203.079766s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44950}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 203.079834s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44948}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40548 keepalive=None [ 203.079845s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44948}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 203.079867s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44950}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40550 keepalive=None [ 203.079874s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44950}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 203.083727s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44948}: linkerd_app_core::serve: Connection closed [ 203.084350s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:44950}: linkerd_app_core::serve: Connection closed [ 208.079358s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45022}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 208.079399s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 208.079403s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45022}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45022 [ 208.079426s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.955µs [ 208.079435s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 208.079443s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 208.079438s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45024}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 208.079465s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45024}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45024 [ 208.079488s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45022}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 208.079495s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: hyper::proto::h1::io: parsed 4 headers [ 208.079500s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: hyper::proto::h1::conn: incoming body is empty [ 208.079519s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36280 [ 208.079559s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45024}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 208.079611s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: hyper::proto::h1::io: flushed 106 bytes [ 208.079635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45022}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40622 keepalive=None [ 208.079642s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45022}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 208.079644s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 208.079659s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45024}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40624 keepalive=None [ 208.079663s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45024}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 208.079673s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36280}: linkerd_app_core::serve: Connection closed [ 208.079686s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 208.079709s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=16.2µs [ 208.079721s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 208.079727s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 208.079744s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: hyper::proto::h1::io: parsed 4 headers [ 208.079749s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: hyper::proto::h1::conn: incoming body is empty [ 208.079756s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36278 [ 208.079826s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: hyper::proto::h1::io: flushed 107 bytes [ 208.079856s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 208.079884s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36278}: linkerd_app_core::serve: Connection closed [ 208.083159s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45022}: linkerd_app_core::serve: Connection closed [ 208.083199s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45024}: linkerd_app_core::serve: Connection closed [ 208.674871s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(41), flags: (0x5: END_HEADERS | END_STREAM) } [ 208.674946s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 208.675990s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(41), flags: (0x4: END_HEADERS) } [ 208.676023s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(41), flags: (0x1: END_STREAM) } [ 213.079198s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45084}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 213.079245s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45084}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45084 [ 213.079292s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45082}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 213.079300s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45082}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45082 [ 213.079324s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45084}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 213.079411s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45082}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 213.079491s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45084}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40682 keepalive=None [ 213.079508s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45084}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 213.079538s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45082}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40684 keepalive=None [ 213.079549s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45082}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 213.082855s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45082}: linkerd_app_core::serve: Connection closed [ 213.082908s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45084}: linkerd_app_core::serve: Connection closed [ 218.079378s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45156}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 218.079430s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 218.079436s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45156}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45156 [ 218.079467s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=11.542µs [ 218.079478s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 218.079488s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 218.079493s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45158}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 218.079506s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45158}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45158 [ 218.079524s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: hyper::proto::h1::io: parsed 4 headers [ 218.079532s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45156}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 218.079547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: hyper::proto::h1::conn: incoming body is empty [ 218.079581s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36420 [ 218.079649s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45158}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 218.079699s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: hyper::proto::h1::io: flushed 107 bytes [ 218.079723s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45156}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40762 keepalive=None [ 218.079734s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45156}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 218.079743s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 218.079759s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45158}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40764 keepalive=None [ 218.079765s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45158}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 218.079771s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36420}: linkerd_app_core::serve: Connection closed [ 218.079807s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 218.079821s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.029µs [ 218.079827s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 218.079834s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 218.079855s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: hyper::proto::h1::io: parsed 4 headers [ 218.079861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: hyper::proto::h1::conn: incoming body is empty [ 218.079868s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36418 [ 218.079940s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: hyper::proto::h1::io: flushed 106 bytes [ 218.079971s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 218.079991s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36418}: linkerd_app_core::serve: Connection closed [ 218.083024s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45158}: linkerd_app_core::serve: Connection closed [ 218.083073s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45156}: linkerd_app_core::serve: Connection closed [ 218.674550s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(43), flags: (0x5: END_HEADERS | END_STREAM) } [ 218.674614s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 218.675743s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(43), flags: (0x4: END_HEADERS) } [ 218.675768s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(43), flags: (0x1: END_STREAM) } [ 223.079927s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45234}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 223.079975s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45234}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45234 [ 223.080012s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45232}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 223.080024s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45232}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45232 [ 223.080048s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 223.080115s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 223.080175s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40832 keepalive=None [ 223.080192s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45234}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 223.080205s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40834 keepalive=None [ 223.080208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45232}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 223.083789s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45234}: linkerd_app_core::serve: Connection closed [ 223.083854s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45232}: linkerd_app_core::serve: Connection closed [ 228.079407s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45308}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 228.079438s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 228.079463s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45308}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45308 [ 228.079482s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.745µs [ 228.079490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 228.079496s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 228.079511s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45310}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 228.079521s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: hyper::proto::h1::io: parsed 4 headers [ 228.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45310}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45310 [ 228.079533s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: hyper::proto::h1::conn: incoming body is empty [ 228.079543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36570 [ 228.079553s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45308}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 228.079630s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: hyper::proto::h1::io: flushed 106 bytes [ 228.079650s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45310}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 228.079660s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 228.079680s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36570}: linkerd_app_core::serve: Connection closed [ 228.079692s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 228.079704s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.779µs [ 228.079713s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 228.079719s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 228.079717s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45308}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40912 keepalive=None [ 228.079727s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45308}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 228.079737s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: hyper::proto::h1::io: parsed 4 headers [ 228.079742s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: hyper::proto::h1::conn: incoming body is empty [ 228.079747s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45310}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40914 keepalive=None [ 228.079752s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45310}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 228.079750s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36578 [ 228.079822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: hyper::proto::h1::io: flushed 107 bytes [ 228.079836s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 228.079848s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36578}: linkerd_app_core::serve: Connection closed [ 228.083159s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45310}: linkerd_app_core::serve: Connection closed [ 228.083240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45308}: linkerd_app_core::serve: Connection closed [ 228.675277s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(45), flags: (0x5: END_HEADERS | END_STREAM) } [ 228.675336s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 228.676450s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(45), flags: (0x4: END_HEADERS) } [ 228.676484s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(45), flags: (0x1: END_STREAM) } [ 233.079686s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45380}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 233.079734s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45380}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45380 [ 233.079785s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45382}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 233.079795s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45382}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45382 [ 233.079818s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45380}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 233.079901s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45382}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 233.079974s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45380}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40978 keepalive=None [ 233.079997s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45380}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 233.080016s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45382}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:40980 keepalive=None [ 233.080023s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45382}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 233.083180s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45380}: linkerd_app_core::serve: Connection closed [ 233.083281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45382}: linkerd_app_core::serve: Connection closed [ 238.079419s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45454}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 238.079458s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 238.079471s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45454}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45454 [ 238.079488s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.508µs [ 238.079499s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 238.079508s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 238.079511s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45456}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 238.079519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45456}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45456 [ 238.079540s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45454}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 238.079544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: hyper::proto::h1::io: parsed 4 headers [ 238.079550s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: hyper::proto::h1::conn: incoming body is empty [ 238.079563s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36716 [ 238.079617s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45456}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 238.079668s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: hyper::proto::h1::io: flushed 107 bytes [ 238.079684s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45454}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41056 keepalive=None [ 238.079692s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45454}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 238.079698s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 238.079715s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45456}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41058 keepalive=None [ 238.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45456}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 238.079730s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36716}: linkerd_app_core::serve: Connection closed [ 238.079749s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 238.079770s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.5µs [ 238.079790s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 238.079797s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 238.079816s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: hyper::proto::h1::io: parsed 4 headers [ 238.079827s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: hyper::proto::h1::conn: incoming body is empty [ 238.079836s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36722 [ 238.079915s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: hyper::proto::h1::io: flushed 106 bytes [ 238.079941s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 238.079956s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36722}: linkerd_app_core::serve: Connection closed [ 238.083011s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45454}: linkerd_app_core::serve: Connection closed [ 238.083064s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45456}: linkerd_app_core::serve: Connection closed [ 238.675284s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(47), flags: (0x5: END_HEADERS | END_STREAM) } [ 238.675346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 238.676442s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(47), flags: (0x4: END_HEADERS) } [ 238.676468s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(47), flags: (0x1: END_STREAM) } [ 243.079164s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45524}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 243.079210s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45524}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45524 [ 243.079253s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45522}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 243.079266s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45522}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45522 [ 243.079292s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45524}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 243.079360s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45522}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 243.079427s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45524}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41122 keepalive=None [ 243.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45524}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 243.079461s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45522}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41124 keepalive=None [ 243.079464s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45522}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 243.082743s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45524}: linkerd_app_core::serve: Connection closed [ 243.082804s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45522}: linkerd_app_core::serve: Connection closed [ 248.079152s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 248.079109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45604}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 248.079190s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45604}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45604 [ 248.079196s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.416µs [ 248.079207s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 248.079215s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 248.079243s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: hyper::proto::h1::io: parsed 4 headers [ 248.079246s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: hyper::proto::h1::conn: incoming body is empty [ 248.079256s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36868 [ 248.079255s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45606}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 248.079270s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45606}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45606 [ 248.079304s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45604}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 248.079333s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: hyper::proto::h1::io: flushed 106 bytes [ 248.079354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 248.079383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36868}: linkerd_app_core::serve: Connection closed [ 248.079392s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45606}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 248.079401s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 248.079413s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.681µs [ 248.079432s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 248.079438s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 248.079457s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: hyper::proto::h1::io: parsed 4 headers [ 248.079466s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: hyper::proto::h1::conn: incoming body is empty [ 248.079471s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:36866 [ 248.079501s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45604}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41210 keepalive=None [ 248.079518s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45604}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 248.079542s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: hyper::proto::h1::io: flushed 107 bytes [ 248.079558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45606}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41212 keepalive=None [ 248.079572s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45606}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 248.079559s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 248.079593s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:36866}: linkerd_app_core::serve: Connection closed [ 248.082925s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45604}: linkerd_app_core::serve: Connection closed [ 248.082975s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45606}: linkerd_app_core::serve: Connection closed [ 248.674422s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(49), flags: (0x5: END_HEADERS | END_STREAM) } [ 248.674473s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 248.675413s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(49), flags: (0x4: END_HEADERS) } [ 248.675439s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(49), flags: (0x1: END_STREAM) } [ 250.339098s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 250.339197s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 250.339213s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 253.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45686}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 253.079791s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45686}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45686 [ 253.079845s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45688}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 253.079859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45688}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45688 [ 253.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45686}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 253.080024s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45688}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 253.080099s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45686}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41286 keepalive=None [ 253.080114s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45686}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 253.080145s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45688}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41288 keepalive=None [ 253.080150s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45688}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 253.083324s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45686}: linkerd_app_core::serve: Connection closed [ 253.083385s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45688}: linkerd_app_core::serve: Connection closed [ 258.079255s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45766}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 258.079308s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45766}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45766 [ 258.079345s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45768}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 258.079361s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45768}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45768 [ 258.079392s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45766}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 258.079465s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45768}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 258.079540s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45766}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41370 keepalive=None [ 258.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45766}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 258.079588s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45768}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41372 keepalive=None [ 258.079597s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45768}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 258.079619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 258.079644s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.926µs [ 258.079655s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 258.079663s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 258.079702s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: hyper::proto::h1::io: parsed 4 headers [ 258.079709s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: hyper::proto::h1::conn: incoming body is empty [ 258.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37036 [ 258.079802s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: hyper::proto::h1::io: flushed 107 bytes [ 258.079833s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 258.079861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37036}: linkerd_app_core::serve: Connection closed [ 258.079875s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 258.079886s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.759µs [ 258.079890s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 258.079896s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 258.079912s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: hyper::proto::h1::io: parsed 4 headers [ 258.079916s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: hyper::proto::h1::conn: incoming body is empty [ 258.079922s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37034 [ 258.079996s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: hyper::proto::h1::io: flushed 106 bytes [ 258.080017s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 258.080032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37034}: linkerd_app_core::serve: Connection closed [ 258.082947s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45766}: linkerd_app_core::serve: Connection closed [ 258.083000s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45768}: linkerd_app_core::serve: Connection closed [ 258.675106s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(51), flags: (0x5: END_HEADERS | END_STREAM) } [ 258.675169s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 258.676082s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(51), flags: (0x4: END_HEADERS) } [ 258.676109s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(51), flags: (0x1: END_STREAM) } [ 263.079327s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45832}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 263.079363s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45832}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45832 [ 263.079409s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45830}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 263.079421s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45830}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45830 [ 263.079456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45832}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 263.079538s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45830}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 263.079591s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45832}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41430 keepalive=None [ 263.079596s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45832}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 263.079612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45830}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41432 keepalive=None [ 263.079615s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45830}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 263.083012s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45830}: linkerd_app_core::serve: Connection closed [ 263.083093s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45832}: linkerd_app_core::serve: Connection closed [ 268.079553s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45904}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 268.079588s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 268.079623s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45904}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45904 [ 268.079643s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.487µs [ 268.079655s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 268.079663s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 268.079667s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45906}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 268.079683s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45906}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45906 [ 268.079691s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: hyper::proto::h1::io: parsed 4 headers [ 268.079700s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: hyper::proto::h1::conn: incoming body is empty [ 268.079709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45904}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 268.079709s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37166 [ 268.079795s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: hyper::proto::h1::io: flushed 106 bytes [ 268.079810s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45906}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 268.079822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 268.079841s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37166}: linkerd_app_core::serve: Connection closed [ 268.079851s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 268.079860s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.667µs [ 268.079865s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 268.079869s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 268.079884s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: hyper::proto::h1::io: parsed 4 headers [ 268.079888s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: hyper::proto::h1::conn: incoming body is empty [ 268.079884s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45904}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41508 keepalive=None [ 268.079897s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45904}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 268.079895s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37174 [ 268.079948s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: hyper::proto::h1::io: flushed 107 bytes [ 268.079966s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45906}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41510 keepalive=None [ 268.080012s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 268.080038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45906}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 268.080064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37174}: linkerd_app_core::serve: Connection closed [ 268.083146s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45904}: linkerd_app_core::serve: Connection closed [ 268.083193s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45906}: linkerd_app_core::serve: Connection closed [ 268.674482s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(53), flags: (0x5: END_HEADERS | END_STREAM) } [ 268.674538s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 268.675554s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(53), flags: (0x4: END_HEADERS) } [ 268.675581s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(53), flags: (0x1: END_STREAM) } [ 270.337994s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 270.338070s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 270.338084s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 273.079336s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45972}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 273.079377s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45972}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45972 [ 273.079418s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45974}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 273.079431s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45974}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:45974 [ 273.079456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45972}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 273.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45974}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 273.079635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45972}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41570 keepalive=None [ 273.079652s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45972}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 273.079680s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45974}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41572 keepalive=None [ 273.079693s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45974}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 273.083344s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45974}: linkerd_app_core::serve: Connection closed [ 273.083390s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:45972}: linkerd_app_core::serve: Connection closed [ 278.079554s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46044}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 278.079598s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46044}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46044 [ 278.079611s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 278.079634s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.456µs [ 278.079644s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 278.079651s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 278.079645s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46052}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 278.079677s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46052}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46052 [ 278.079696s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: hyper::proto::h1::io: parsed 4 headers [ 278.079705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: hyper::proto::h1::conn: incoming body is empty [ 278.079707s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46044}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 278.079716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37308 [ 278.079783s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46052}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 278.079795s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: hyper::proto::h1::io: flushed 107 bytes [ 278.079815s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 278.079837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37308}: linkerd_app_core::serve: Connection closed [ 278.079869s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 278.079881s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.948µs [ 278.079886s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 278.079891s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 278.079849s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46044}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41648 keepalive=None [ 278.079905s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: hyper::proto::h1::io: parsed 4 headers [ 278.079905s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46044}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 278.079907s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: hyper::proto::h1::conn: incoming body is empty [ 278.079913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37306 [ 278.079927s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46052}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41650 keepalive=None [ 278.079934s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46052}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 278.079980s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: hyper::proto::h1::io: flushed 106 bytes [ 278.080000s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 278.080013s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37306}: linkerd_app_core::serve: Connection closed [ 278.083260s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46044}: linkerd_app_core::serve: Connection closed [ 278.083300s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46052}: linkerd_app_core::serve: Connection closed [ 278.674533s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(55), flags: (0x5: END_HEADERS | END_STREAM) } [ 278.674584s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 278.675537s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(55), flags: (0x4: END_HEADERS) } [ 278.675563s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(55), flags: (0x1: END_STREAM) } [ 283.079005s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46120}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 283.079052s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46120}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46120 [ 283.079093s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46122}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 283.079101s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46122}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46122 [ 283.079142s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46120}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 283.079223s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46122}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 283.079278s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46120}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41720 keepalive=None [ 283.079290s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46120}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 283.079311s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46122}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41722 keepalive=None [ 283.079315s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46122}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 283.082571s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46120}: linkerd_app_core::serve: Connection closed [ 283.082822s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46122}: linkerd_app_core::serve: Connection closed [ 288.079778s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46196}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 288.079809s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 288.079834s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46196}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46196 [ 288.079857s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.34µs [ 288.079868s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 288.079882s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 288.079892s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46198}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 288.079912s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46198}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46198 [ 288.079914s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: hyper::proto::h1::io: parsed 4 headers [ 288.079931s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: hyper::proto::h1::conn: incoming body is empty [ 288.079941s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37462 [ 288.079949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46196}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 288.080036s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: hyper::proto::h1::io: flushed 106 bytes [ 288.080045s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46198}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 288.080063s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 288.080097s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37462}: linkerd_app_core::serve: Connection closed [ 288.080122s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 288.080134s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.468µs [ 288.080160s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 288.080129s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46196}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41798 keepalive=None [ 288.080166s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 288.080169s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46196}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 288.080194s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46198}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41800 keepalive=None [ 288.080216s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46198}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 288.080196s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: hyper::proto::h1::io: parsed 4 headers [ 288.080241s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: hyper::proto::h1::conn: incoming body is empty [ 288.080248s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37464 [ 288.080306s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: hyper::proto::h1::io: flushed 107 bytes [ 288.080331s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 288.080346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37464}: linkerd_app_core::serve: Connection closed [ 288.083793s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46198}: linkerd_app_core::serve: Connection closed [ 288.086504s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46196}: linkerd_app_core::serve: Connection closed [ 288.674590s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(57), flags: (0x5: END_HEADERS | END_STREAM) } [ 288.674641s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 288.675621s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(57), flags: (0x4: END_HEADERS) } [ 288.675648s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(57), flags: (0x1: END_STREAM) } [ 293.079519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46252}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 293.079567s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46252}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46252 [ 293.079607s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46254}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 293.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46254}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46254 [ 293.079651s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46252}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 293.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46254}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 293.079796s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46252}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41852 keepalive=None [ 293.079808s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46252}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 293.079825s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46254}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41854 keepalive=None [ 293.079833s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46254}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 293.083013s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46254}: linkerd_app_core::serve: Connection closed [ 293.083064s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46252}: linkerd_app_core::serve: Connection closed [ 298.079651s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46342}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 298.079690s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46342}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46342 [ 298.079695s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 298.079717s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.332µs [ 298.079723s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 298.079731s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 298.079735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46336}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 298.079747s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46336}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46336 [ 298.079764s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: hyper::proto::h1::io: parsed 4 headers [ 298.079776s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: hyper::proto::h1::conn: incoming body is empty [ 298.079779s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 298.079789s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37600 [ 298.079857s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46336}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 298.079870s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: hyper::proto::h1::io: flushed 106 bytes [ 298.079894s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 298.079913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37600}: linkerd_app_core::serve: Connection closed [ 298.079923s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 298.079927s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41938 keepalive=None [ 298.079933s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.759µs [ 298.079936s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46342}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 298.079938s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 298.079943s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 298.079961s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: hyper::proto::h1::io: parsed 4 headers [ 298.079964s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: hyper::proto::h1::conn: incoming body is empty [ 298.079964s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46336}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:41940 keepalive=None [ 298.079969s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46336}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 298.079969s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37598 [ 298.080030s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: hyper::proto::h1::io: flushed 107 bytes [ 298.080060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 298.080080s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37598}: linkerd_app_core::serve: Connection closed [ 298.083039s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46342}: linkerd_app_core::serve: Connection closed [ 298.083108s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46336}: linkerd_app_core::serve: Connection closed [ 298.675370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(59), flags: (0x5: END_HEADERS | END_STREAM) } [ 298.675423s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 298.676362s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(59), flags: (0x4: END_HEADERS) } [ 298.676399s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(59), flags: (0x1: END_STREAM) } [ 303.078986s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46406}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 303.079038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46406}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46406 [ 303.079072s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46408}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 303.079079s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46408}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46408 [ 303.079104s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46406}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 303.079193s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46408}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 303.079240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46406}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42006 keepalive=None [ 303.079249s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46406}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 303.079269s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46408}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42008 keepalive=None [ 303.079273s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46408}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 303.082294s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46406}: linkerd_app_core::serve: Connection closed [ 303.082820s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46408}: linkerd_app_core::serve: Connection closed [ 308.079057s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46490}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 308.079089s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 308.079114s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46490}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46490 [ 308.079148s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.137µs [ 308.079166s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 308.079173s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 308.079195s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46492}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 308.079214s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46492}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46492 [ 308.079205s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: hyper::proto::h1::io: parsed 4 headers [ 308.079221s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: hyper::proto::h1::conn: incoming body is empty [ 308.079231s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37760 [ 308.079239s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46490}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 308.079320s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: hyper::proto::h1::io: flushed 106 bytes [ 308.079343s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46492}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 308.079344s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 308.079421s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37760}: linkerd_app_core::serve: Connection closed [ 308.079433s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46490}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42094 keepalive=None [ 308.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46490}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 308.079438s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 308.079452s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.017µs [ 308.079459s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 308.079461s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46492}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42096 keepalive=None [ 308.079465s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46492}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 308.079465s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 308.079519s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: hyper::proto::h1::io: parsed 4 headers [ 308.079524s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: hyper::proto::h1::conn: incoming body is empty [ 308.079531s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37752 [ 308.079597s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: hyper::proto::h1::io: flushed 107 bytes [ 308.079617s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 308.079635s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37752}: linkerd_app_core::serve: Connection closed [ 308.082472s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46492}: linkerd_app_core::serve: Connection closed [ 308.082528s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46490}: linkerd_app_core::serve: Connection closed [ 308.675257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(61), flags: (0x5: END_HEADERS | END_STREAM) } [ 308.675318s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 308.676368s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(61), flags: (0x4: END_HEADERS) } [ 308.676405s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(61), flags: (0x1: END_STREAM) } [ 310.338799s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 310.338882s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 310.338895s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 313.079356s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46574}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 313.079401s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46574}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46574 [ 313.079450s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46576}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 313.079466s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46576}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46576 [ 313.079496s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46574}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 313.079616s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46576}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 313.079698s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46574}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42174 keepalive=None [ 313.079708s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46574}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 313.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46576}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42176 keepalive=None [ 313.079746s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46576}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 313.083285s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46576}: linkerd_app_core::serve: Connection closed [ 313.083327s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46574}: linkerd_app_core::serve: Connection closed [ 318.079543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46652}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 318.079586s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46652}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46652 [ 318.079632s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46654}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 318.079645s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46654}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46654 [ 318.079677s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46652}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 318.079767s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46654}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 318.079813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46652}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42254 keepalive=None [ 318.079819s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46652}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 318.079831s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46654}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42256 keepalive=None [ 318.079838s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46654}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 318.080682s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 318.080705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.635µs [ 318.080714s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 318.080721s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 318.080750s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: hyper::proto::h1::io: parsed 4 headers [ 318.080754s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: hyper::proto::h1::conn: incoming body is empty [ 318.080766s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37926 [ 318.080845s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: hyper::proto::h1::io: flushed 107 bytes [ 318.080863s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 318.080880s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37926}: linkerd_app_core::serve: Connection closed [ 318.080888s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 318.080895s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=2.595µs [ 318.080898s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 318.080901s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 318.080911s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: hyper::proto::h1::io: parsed 4 headers [ 318.080913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: hyper::proto::h1::conn: incoming body is empty [ 318.080917s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:37914 [ 318.080961s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: hyper::proto::h1::io: flushed 106 bytes [ 318.080981s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 318.080997s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:37914}: linkerd_app_core::serve: Connection closed [ 318.084838s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46654}: linkerd_app_core::serve: Connection closed [ 318.084895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46652}: linkerd_app_core::serve: Connection closed [ 318.674493s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(63), flags: (0x5: END_HEADERS | END_STREAM) } [ 318.674543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 318.675570s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(63), flags: (0x4: END_HEADERS) } [ 318.675599s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(63), flags: (0x1: END_STREAM) } [ 323.079242s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46716}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 323.079291s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46716}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46716 [ 323.079348s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46714}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 323.079362s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46714}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46714 [ 323.079387s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46716}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 323.079466s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46714}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 323.079540s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46716}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42312 keepalive=None [ 323.079554s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46716}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 323.079574s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46714}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42314 keepalive=None [ 323.079585s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46714}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 323.082753s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46716}: linkerd_app_core::serve: Connection closed [ 323.083359s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46714}: linkerd_app_core::serve: Connection closed [ 328.079484s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46780}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 328.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46780}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46780 [ 328.079544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 328.079564s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.975µs [ 328.079573s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 328.079572s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46788}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 328.079580s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 328.079583s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46788}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46788 [ 328.079612s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: hyper::proto::h1::io: parsed 4 headers [ 328.079621s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46780}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 328.079623s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: hyper::proto::h1::conn: incoming body is empty [ 328.079635s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38042 [ 328.079717s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46788}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 328.079724s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: hyper::proto::h1::io: flushed 107 bytes [ 328.079745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 328.079765s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38042}: linkerd_app_core::serve: Connection closed [ 328.079775s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 328.079779s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46780}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42384 keepalive=None [ 328.079786s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46780}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 328.079786s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.978µs [ 328.079792s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 328.079797s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 328.079810s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: hyper::proto::h1::io: parsed 4 headers [ 328.079811s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46788}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42386 keepalive=None [ 328.079813s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: hyper::proto::h1::conn: incoming body is empty [ 328.079815s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46788}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 328.079819s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38044 [ 328.079869s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: hyper::proto::h1::io: flushed 106 bytes [ 328.079887s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 328.079898s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38044}: linkerd_app_core::serve: Connection closed [ 328.083067s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46780}: linkerd_app_core::serve: Connection closed [ 328.083115s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46788}: linkerd_app_core::serve: Connection closed [ 328.675198s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(65), flags: (0x5: END_HEADERS | END_STREAM) } [ 328.675246s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 328.676111s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(65), flags: (0x4: END_HEADERS) } [ 328.676137s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(65), flags: (0x1: END_STREAM) } [ 333.079795s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46850}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 333.079835s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46850}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46850 [ 333.079873s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46852}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 333.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46852}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46852 [ 333.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46850}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 333.080017s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46852}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 333.080096s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46850}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42450 keepalive=None [ 333.080111s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46850}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 333.080134s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46852}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42452 keepalive=None [ 333.080143s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46852}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 333.083584s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46850}: linkerd_app_core::serve: Connection closed [ 333.083624s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46852}: linkerd_app_core::serve: Connection closed [ 338.079089s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46924}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 338.079165s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46924}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46924 [ 338.079210s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 338.079216s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46922}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 338.079228s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46922}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:46922 [ 338.079243s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.965µs [ 338.079251s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46924}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 338.079267s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 338.079273s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 338.079310s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: hyper::proto::h1::io: parsed 4 headers [ 338.079319s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: hyper::proto::h1::conn: incoming body is empty [ 338.079333s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38184 [ 338.079365s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46922}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 338.079433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: hyper::proto::h1::io: flushed 106 bytes [ 338.079453s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46924}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42526 keepalive=None [ 338.079462s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46924}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 338.079462s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 338.079482s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46922}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42528 keepalive=None [ 338.079501s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46922}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 338.079483s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38184}: linkerd_app_core::serve: Connection closed [ 338.079518s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 338.079536s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.138µs [ 338.079542s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 338.079548s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 338.079595s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: hyper::proto::h1::io: parsed 4 headers [ 338.079602s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: hyper::proto::h1::conn: incoming body is empty [ 338.079608s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38192 [ 338.079661s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: hyper::proto::h1::io: flushed 107 bytes [ 338.079682s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 338.079696s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38192}: linkerd_app_core::serve: Connection closed [ 338.082777s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46924}: linkerd_app_core::serve: Connection closed [ 338.082815s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:46922}: linkerd_app_core::serve: Connection closed [ 338.675234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(67), flags: (0x5: END_HEADERS | END_STREAM) } [ 338.675290s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 338.676314s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(67), flags: (0x4: END_HEADERS) } [ 338.676340s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(67), flags: (0x1: END_STREAM) } [ 343.079716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47000}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 343.079763s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47000}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47000 [ 343.079808s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47002}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 343.079825s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47002}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47002 [ 343.079856s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47000}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 343.079980s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47002}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 343.080052s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47000}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42600 keepalive=None [ 343.080060s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47000}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 343.080083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47002}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42602 keepalive=None [ 343.080087s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47002}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 343.083312s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47002}: linkerd_app_core::serve: Connection closed [ 343.083388s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47000}: linkerd_app_core::serve: Connection closed [ 348.079181s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47076}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 348.079221s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47076}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47076 [ 348.079260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 348.079276s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47082}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 348.079284s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.785µs [ 348.079288s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47082}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47082 [ 348.079292s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 348.079300s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 348.079316s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47076}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 348.079338s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: hyper::proto::h1::io: parsed 4 headers [ 348.079348s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: hyper::proto::h1::conn: incoming body is empty [ 348.079361s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38338 [ 348.079405s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47082}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 348.079445s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: hyper::proto::h1::io: flushed 107 bytes [ 348.079464s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 348.079470s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47076}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42678 keepalive=None [ 348.079475s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47076}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 348.079487s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38338}: linkerd_app_core::serve: Connection closed [ 348.079495s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47082}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42680 keepalive=None [ 348.079515s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47082}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 348.079496s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 348.079535s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.054µs [ 348.079547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 348.079553s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 348.079582s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: hyper::proto::h1::io: parsed 4 headers [ 348.079589s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: hyper::proto::h1::conn: incoming body is empty [ 348.079595s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38342 [ 348.079678s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: hyper::proto::h1::io: flushed 106 bytes [ 348.079703s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 348.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38342}: linkerd_app_core::serve: Connection closed [ 348.082842s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47076}: linkerd_app_core::serve: Connection closed [ 348.082885s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47082}: linkerd_app_core::serve: Connection closed [ 348.675241s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(69), flags: (0x5: END_HEADERS | END_STREAM) } [ 348.675296s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 348.676334s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(69), flags: (0x4: END_HEADERS) } [ 348.676368s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(69), flags: (0x1: END_STREAM) } [ 350.339405s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 350.339468s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 350.339482s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 353.078933s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47134}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 353.078981s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47134}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47134 [ 353.079028s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47136}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 353.079041s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47136}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47136 [ 353.079072s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47134}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 353.079172s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47136}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 353.079221s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47134}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42732 keepalive=None [ 353.079230s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47134}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 353.079341s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47136}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42734 keepalive=None [ 353.079351s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47136}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 353.082555s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47136}: linkerd_app_core::serve: Connection closed [ 353.082632s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47134}: linkerd_app_core::serve: Connection closed [ 358.079211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47220}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 358.079259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47220}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47220 [ 358.079266s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 358.079292s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.546µs [ 358.079302s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 358.079310s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 358.079318s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47222}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 358.079339s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47222}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47222 [ 358.079343s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: hyper::proto::h1::io: parsed 4 headers [ 358.079368s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: hyper::proto::h1::conn: incoming body is empty [ 358.079378s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38484 [ 358.079385s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47220}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 358.079458s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: hyper::proto::h1::io: flushed 106 bytes [ 358.079485s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47222}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 358.079487s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 358.079524s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38484}: linkerd_app_core::serve: Connection closed [ 358.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 358.079551s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=2.815µs [ 358.079554s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 358.079558s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 358.079555s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47220}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42826 keepalive=None [ 358.079563s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47220}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 358.079571s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: hyper::proto::h1::io: parsed 4 headers [ 358.079574s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: hyper::proto::h1::conn: incoming body is empty [ 358.079583s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47222}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42828 keepalive=None [ 358.079605s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47222}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 358.079579s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38482 [ 358.079679s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: hyper::proto::h1::io: flushed 107 bytes [ 358.079697s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 358.079710s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38482}: linkerd_app_core::serve: Connection closed [ 358.082650s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47220}: linkerd_app_core::serve: Connection closed [ 358.082812s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47222}: linkerd_app_core::serve: Connection closed [ 358.674223s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(71), flags: (0x5: END_HEADERS | END_STREAM) } [ 358.674288s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 358.675418s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(71), flags: (0x4: END_HEADERS) } [ 358.675454s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(71), flags: (0x1: END_STREAM) } [ 363.079500s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47290}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 363.079546s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47290}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47290 [ 363.079582s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47292}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 363.079594s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47292}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47292 [ 363.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47290}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 363.079694s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47292}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 363.079755s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47290}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42890 keepalive=None [ 363.079773s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47290}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 363.079802s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47292}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42892 keepalive=None [ 363.079830s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47292}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 363.082821s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47290}: linkerd_app_core::serve: Connection closed [ 363.082874s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47292}: linkerd_app_core::serve: Connection closed [ 368.079085s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47368}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 368.079151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47368}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47368 [ 368.079164s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 368.079192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.19µs [ 368.079205s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 368.079206s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47374}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 368.079218s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 368.079221s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47374}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47374 [ 368.079253s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47368}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 368.079255s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: hyper::proto::h1::io: parsed 4 headers [ 368.079278s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: hyper::proto::h1::conn: incoming body is empty [ 368.079294s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38630 [ 368.079374s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47374}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 368.079400s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: hyper::proto::h1::io: flushed 106 bytes [ 368.079428s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 368.079456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47368}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42970 keepalive=None [ 368.079492s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47368}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 368.079459s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38630}: linkerd_app_core::serve: Connection closed [ 368.079524s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47374}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:42972 keepalive=None [ 368.079525s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 368.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47374}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 368.079540s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.408µs [ 368.079548s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 368.079555s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 368.079574s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: hyper::proto::h1::io: parsed 4 headers [ 368.079586s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: hyper::proto::h1::conn: incoming body is empty [ 368.079593s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38634 [ 368.079668s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: hyper::proto::h1::io: flushed 107 bytes [ 368.079706s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 368.079742s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38634}: linkerd_app_core::serve: Connection closed [ 368.082920s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47374}: linkerd_app_core::serve: Connection closed [ 368.082961s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47368}: linkerd_app_core::serve: Connection closed [ 368.675225s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(73), flags: (0x5: END_HEADERS | END_STREAM) } [ 368.675284s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 368.676315s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(73), flags: (0x4: END_HEADERS) } [ 368.676342s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(73), flags: (0x1: END_STREAM) } [ 370.335503s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 370.335584s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 370.335600s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 373.079964s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47454}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 373.080008s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47454}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47454 [ 373.080054s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47452}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 373.080072s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47452}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47452 [ 373.080108s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47454}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 373.080212s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47452}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 373.080299s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47454}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43052 keepalive=None [ 373.080308s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47454}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 373.080326s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47452}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43054 keepalive=None [ 373.080333s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47452}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 373.083411s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47452}: linkerd_app_core::serve: Connection closed [ 373.083458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47454}: linkerd_app_core::serve: Connection closed [ 378.078982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47528}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 378.079027s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47528}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47528 [ 378.079042s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 378.079069s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.266µs [ 378.079078s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 378.079084s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 378.079074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47532}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 378.079088s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47532}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47532 [ 378.079108s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: hyper::proto::h1::io: parsed 4 headers [ 378.079119s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47528}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 378.079121s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: hyper::proto::h1::conn: incoming body is empty [ 378.079167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38792 [ 378.079228s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47532}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 378.079245s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: hyper::proto::h1::io: flushed 107 bytes [ 378.079269s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 378.079289s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38792}: linkerd_app_core::serve: Connection closed [ 378.079304s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47528}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43130 keepalive=None [ 378.079311s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 378.079313s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47528}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 378.079321s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.677µs [ 378.079326s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 378.079331s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 378.079350s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: hyper::proto::h1::io: parsed 4 headers [ 378.079375s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: hyper::proto::h1::conn: incoming body is empty [ 378.079350s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47532}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43132 keepalive=None [ 378.079392s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47532}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 378.079389s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38796 [ 378.079446s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: hyper::proto::h1::io: flushed 106 bytes [ 378.079465s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 378.079478s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38796}: linkerd_app_core::serve: Connection closed [ 378.082294s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47532}: linkerd_app_core::serve: Connection closed [ 378.082349s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47528}: linkerd_app_core::serve: Connection closed [ 378.674646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(75), flags: (0x5: END_HEADERS | END_STREAM) } [ 378.674702s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 378.675673s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(75), flags: (0x4: END_HEADERS) } [ 378.675699s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(75), flags: (0x1: END_STREAM) } [ 380.345005s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 380.345085s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 380.345103s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 383.079340s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47582}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 383.079384s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47582}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47582 [ 383.079421s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47584}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 383.079435s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47584}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47584 [ 383.079456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 383.079524s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 383.079582s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43182 keepalive=None [ 383.079593s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47582}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 383.079617s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43184 keepalive=None [ 383.079621s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47584}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 383.082439s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47584}: linkerd_app_core::serve: Connection closed [ 383.082925s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47582}: linkerd_app_core::serve: Connection closed [ 388.079797s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47658}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 388.079848s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 388.079853s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47658}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47658 [ 388.079872s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.815µs [ 388.079880s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 388.079887s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 388.079895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47666}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 388.079905s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47666}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47666 [ 388.079919s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: hyper::proto::h1::io: parsed 4 headers [ 388.079929s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47658}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 388.079933s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: hyper::proto::h1::conn: incoming body is empty [ 388.079947s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38920 [ 388.080016s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47666}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 388.080044s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: hyper::proto::h1::io: flushed 106 bytes [ 388.080089s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 388.080102s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47658}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43262 keepalive=None [ 388.080111s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47658}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 388.080132s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38920}: linkerd_app_core::serve: Connection closed [ 388.080142s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47666}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43264 keepalive=None [ 388.080148s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47666}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 388.080155s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 388.080168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.558µs [ 388.080174s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 388.080179s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 388.080197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: hyper::proto::h1::io: parsed 4 headers [ 388.080201s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: hyper::proto::h1::conn: incoming body is empty [ 388.080208s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:38922 [ 388.080282s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: hyper::proto::h1::io: flushed 107 bytes [ 388.080303s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 388.080318s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:38922}: linkerd_app_core::serve: Connection closed [ 388.083219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47658}: linkerd_app_core::serve: Connection closed [ 388.083733s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47666}: linkerd_app_core::serve: Connection closed [ 388.675149s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(77), flags: (0x5: END_HEADERS | END_STREAM) } [ 388.675204s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 388.676290s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(77), flags: (0x4: END_HEADERS) } [ 388.676327s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(77), flags: (0x1: END_STREAM) } [ 390.340243s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 390.340312s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 390.340324s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 393.079315s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47736}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 393.079370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47736}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47736 [ 393.079410s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47734}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 393.079424s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47734}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47734 [ 393.079465s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47736}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 393.079562s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47734}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 393.079646s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47736}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43334 keepalive=None [ 393.079658s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47736}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 393.079687s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47734}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43336 keepalive=None [ 393.079699s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47734}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 393.082578s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47736}: linkerd_app_core::serve: Connection closed [ 393.082629s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47734}: linkerd_app_core::serve: Connection closed [ 398.079711s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47808}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 398.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 398.079765s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47808}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47808 [ 398.079791s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.855µs [ 398.079799s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 398.079805s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 398.079821s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47816}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 398.079838s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47816}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47816 [ 398.079839s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: hyper::proto::h1::io: parsed 4 headers [ 398.079844s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: hyper::proto::h1::conn: incoming body is empty [ 398.079854s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39072 [ 398.079861s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47808}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 398.079937s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: hyper::proto::h1::io: flushed 107 bytes [ 398.079967s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 398.079979s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47816}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 398.079993s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39072}: linkerd_app_core::serve: Connection closed [ 398.080008s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 398.080023s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.873µs [ 398.080029s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 398.080036s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 398.080055s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: hyper::proto::h1::io: parsed 4 headers [ 398.080060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: hyper::proto::h1::conn: incoming body is empty [ 398.080066s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39070 [ 398.080069s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47808}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43412 keepalive=None [ 398.080079s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47808}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 398.080108s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47816}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43414 keepalive=None [ 398.080112s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47816}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 398.080128s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: hyper::proto::h1::io: flushed 106 bytes [ 398.080151s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 398.080167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39070}: linkerd_app_core::serve: Connection closed [ 398.087321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47808}: linkerd_app_core::serve: Connection closed [ 398.087370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47816}: linkerd_app_core::serve: Connection closed [ 398.675309s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(79), flags: (0x5: END_HEADERS | END_STREAM) } [ 398.675370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 398.676400s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(79), flags: (0x4: END_HEADERS) } [ 398.676427s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(79), flags: (0x1: END_STREAM) } [ 400.338080s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 400.338147s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 400.338156s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 403.079363s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47882}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 403.079405s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47882}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47882 [ 403.079448s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47884}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 403.079464s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47884}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47884 [ 403.079495s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47882}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 403.079585s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47884}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 403.079646s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47882}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43482 keepalive=None [ 403.079661s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47882}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 403.079683s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47884}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43484 keepalive=None [ 403.079687s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47884}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 403.082759s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47884}: linkerd_app_core::serve: Connection closed [ 403.083457s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47882}: linkerd_app_core::serve: Connection closed [ 408.079327s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47962}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 408.079371s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 408.079376s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47962}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47962 [ 408.079392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.113µs [ 408.079402s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 408.079410s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 408.079417s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47960}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 408.079436s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: hyper::proto::h1::io: parsed 4 headers [ 408.079434s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47960}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:47960 [ 408.079438s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: hyper::proto::h1::conn: incoming body is empty [ 408.079449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39226 [ 408.079464s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47962}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 408.079520s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: hyper::proto::h1::io: flushed 106 bytes [ 408.079546s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47960}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 408.079549s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 408.079568s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39226}: linkerd_app_core::serve: Connection closed [ 408.079577s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 408.079586s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.216µs [ 408.079591s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 408.079596s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 408.079612s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: hyper::proto::h1::io: parsed 4 headers [ 408.079608s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47962}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43564 keepalive=None [ 408.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47962}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 408.079639s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47960}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43566 keepalive=None [ 408.079615s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: hyper::proto::h1::conn: incoming body is empty [ 408.079644s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47960}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 408.079647s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39228 [ 408.079702s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: hyper::proto::h1::io: flushed 107 bytes [ 408.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 408.079737s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39228}: linkerd_app_core::serve: Connection closed [ 408.082521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47962}: linkerd_app_core::serve: Connection closed [ 408.082575s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:47960}: linkerd_app_core::serve: Connection closed [ 408.674357s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(81), flags: (0x5: END_HEADERS | END_STREAM) } [ 408.674414s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 408.675394s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(81), flags: (0x4: END_HEADERS) } [ 408.675421s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(81), flags: (0x1: END_STREAM) } [ 410.358969s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 410.359035s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 410.359043s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 413.078877s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48018}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 413.078913s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48018}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48018 [ 413.078951s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48020}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 413.078965s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48020}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48020 [ 413.078995s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48018}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 413.079072s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48020}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 413.079122s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48018}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43616 keepalive=None [ 413.079151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48018}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 413.079175s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48020}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43618 keepalive=None [ 413.079178s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48020}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 413.082618s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48020}: linkerd_app_core::serve: Connection closed [ 413.083226s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48018}: linkerd_app_core::serve: Connection closed [ 418.079938s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48104}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 418.079978s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 418.080000s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48104}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48104 [ 418.080024s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.418µs [ 418.080035s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 418.080044s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 418.080057s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48102}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 418.080077s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48102}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48102 [ 418.080080s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: hyper::proto::h1::io: parsed 4 headers [ 418.080084s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: hyper::proto::h1::conn: incoming body is empty [ 418.080098s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39370 [ 418.080108s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48104}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 418.080198s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: hyper::proto::h1::io: flushed 106 bytes [ 418.080226s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48102}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 418.080231s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 418.080252s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39370}: linkerd_app_core::serve: Connection closed [ 418.080298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 418.080297s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48104}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43706 keepalive=None [ 418.080306s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48104}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 418.080318s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.09µs [ 418.080324s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 418.080330s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 418.080335s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48102}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43708 keepalive=None [ 418.080341s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48102}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 418.080354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: hyper::proto::h1::io: parsed 4 headers [ 418.080359s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: hyper::proto::h1::conn: incoming body is empty [ 418.080366s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39372 [ 418.080433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: hyper::proto::h1::io: flushed 107 bytes [ 418.080457s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 418.080470s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39372}: linkerd_app_core::serve: Connection closed [ 418.083533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48104}: linkerd_app_core::serve: Connection closed [ 418.083589s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48102}: linkerd_app_core::serve: Connection closed [ 418.674680s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(83), flags: (0x5: END_HEADERS | END_STREAM) } [ 418.674742s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 418.675810s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(83), flags: (0x4: END_HEADERS) } [ 418.675840s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(83), flags: (0x1: END_STREAM) } [ 420.344099s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 420.344164s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 420.344174s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 423.079362s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48174}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 423.079397s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48174}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48174 [ 423.079430s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48172}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 423.079437s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48172}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48172 [ 423.079470s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48174}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 423.079550s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48172}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 423.079605s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48174}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43772 keepalive=None [ 423.079612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48174}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 423.079631s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48172}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43774 keepalive=None [ 423.079635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48172}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 423.082618s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48174}: linkerd_app_core::serve: Connection closed [ 423.082660s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48172}: linkerd_app_core::serve: Connection closed [ 428.079509s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48254}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 428.079547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 428.079566s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48254}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48254 [ 428.079590s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.386µs [ 428.079599s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 428.079605s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 428.079614s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48256}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 428.079625s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48256}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48256 [ 428.079630s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: hyper::proto::h1::io: parsed 4 headers [ 428.079639s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: hyper::proto::h1::conn: incoming body is empty [ 428.079647s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48254}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 428.079649s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39518 [ 428.079715s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: hyper::proto::h1::io: flushed 106 bytes [ 428.079722s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48256}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 428.079739s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 428.079756s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39518}: linkerd_app_core::serve: Connection closed [ 428.079772s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 428.079773s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48254}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43860 keepalive=None [ 428.079780s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48254}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 428.079783s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.897µs [ 428.079822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 428.079800s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48256}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43862 keepalive=None [ 428.079842s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48256}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 428.079828s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 428.079866s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: hyper::proto::h1::io: parsed 4 headers [ 428.079868s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: hyper::proto::h1::conn: incoming body is empty [ 428.079872s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39516 [ 428.079919s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: hyper::proto::h1::io: flushed 107 bytes [ 428.079934s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 428.079947s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39516}: linkerd_app_core::serve: Connection closed [ 428.082870s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48254}: linkerd_app_core::serve: Connection closed [ 428.082925s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48256}: linkerd_app_core::serve: Connection closed [ 428.674431s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(85), flags: (0x5: END_HEADERS | END_STREAM) } [ 428.674490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 428.675478s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(85), flags: (0x4: END_HEADERS) } [ 428.675510s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(85), flags: (0x1: END_STREAM) } [ 430.338354s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 430.338429s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 430.338443s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 433.079401s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48336}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 433.079452s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48336}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48336 [ 433.079491s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48338}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 433.079507s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48338}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48338 [ 433.079541s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48336}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 433.079636s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48338}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 433.079721s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48336}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43936 keepalive=None [ 433.079735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48336}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 433.079764s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48338}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:43938 keepalive=None [ 433.079773s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48338}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 433.082916s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48336}: linkerd_app_core::serve: Connection closed [ 433.083222s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48338}: linkerd_app_core::serve: Connection closed [ 438.079730s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48416}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 438.079765s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 438.079786s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48416}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48416 [ 438.079808s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.178µs [ 438.079820s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 438.079829s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 438.079832s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48412}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 438.079850s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48412}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48412 [ 438.079864s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: hyper::proto::h1::io: parsed 4 headers [ 438.079875s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48416}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 438.079876s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: hyper::proto::h1::conn: incoming body is empty [ 438.079891s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39674 [ 438.079959s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48412}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 438.079981s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: hyper::proto::h1::io: flushed 107 bytes [ 438.080005s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 438.080023s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48416}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44014 keepalive=None [ 438.080025s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39674}: linkerd_app_core::serve: Connection closed [ 438.080063s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 438.080046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48416}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 438.080076s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.107µs [ 438.080081s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 438.080087s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 438.080090s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48412}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44016 keepalive=None [ 438.080094s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48412}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 438.080102s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: hyper::proto::h1::io: parsed 4 headers [ 438.080105s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: hyper::proto::h1::conn: incoming body is empty [ 438.080112s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39680 [ 438.080170s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: hyper::proto::h1::io: flushed 106 bytes [ 438.080191s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 438.080210s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39680}: linkerd_app_core::serve: Connection closed [ 438.083216s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48412}: linkerd_app_core::serve: Connection closed [ 438.083270s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48416}: linkerd_app_core::serve: Connection closed [ 438.674396s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(87), flags: (0x5: END_HEADERS | END_STREAM) } [ 438.674446s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 438.675430s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(87), flags: (0x4: END_HEADERS) } [ 438.675455s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(87), flags: (0x1: END_STREAM) } [ 440.343291s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 440.343381s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 440.343410s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 443.079038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48472}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 443.079076s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48472}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48472 [ 443.079117s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48470}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 443.079146s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48470}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48470 [ 443.079179s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48472}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 443.079259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48470}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 443.079324s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48472}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44070 keepalive=None [ 443.079330s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48472}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 443.079355s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48470}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44072 keepalive=None [ 443.079366s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48470}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 443.082455s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48472}: linkerd_app_core::serve: Connection closed [ 443.083223s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48470}: linkerd_app_core::serve: Connection closed [ 448.079297s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48556}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 448.079334s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 448.079357s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48556}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48556 [ 448.079377s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.847µs [ 448.079387s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 448.079395s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 448.079406s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48548}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 448.079421s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48548}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48548 [ 448.079425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: hyper::proto::h1::io: parsed 4 headers [ 448.079430s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: hyper::proto::h1::conn: incoming body is empty [ 448.079449s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48556}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 448.079445s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39812 [ 448.079557s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: hyper::proto::h1::io: flushed 106 bytes [ 448.079558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48548}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 448.079610s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 448.079676s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39812}: linkerd_app_core::serve: Connection closed [ 448.079698s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 448.079737s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.258µs [ 448.079764s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 448.079770s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 448.079794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: hyper::proto::h1::io: parsed 4 headers [ 448.079797s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: hyper::proto::h1::conn: incoming body is empty [ 448.079816s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39810 [ 448.079825s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48556}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44152 keepalive=None [ 448.079874s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48556}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 448.079907s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: hyper::proto::h1::io: flushed 107 bytes [ 448.079908s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48548}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44154 keepalive=None [ 448.079932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48548}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 448.079942s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 448.079969s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39810}: linkerd_app_core::serve: Connection closed [ 448.083012s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48556}: linkerd_app_core::serve: Connection closed [ 448.083070s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48548}: linkerd_app_core::serve: Connection closed [ 448.674441s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(89), flags: (0x5: END_HEADERS | END_STREAM) } [ 448.674502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 448.675544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(89), flags: (0x4: END_HEADERS) } [ 448.675575s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(89), flags: (0x1: END_STREAM) } [ 453.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48614}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 453.079593s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48614}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48614 [ 453.079639s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48616}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 453.079656s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48616}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48616 [ 453.079691s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48614}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 453.079782s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48616}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 453.079861s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48614}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44214 keepalive=None [ 453.079877s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48614}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 453.079929s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48616}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44216 keepalive=None [ 453.079941s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48616}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 453.082912s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48616}: linkerd_app_core::serve: Connection closed [ 453.082983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48614}: linkerd_app_core::serve: Connection closed [ 458.079726s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48688}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 458.079782s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 458.079780s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48688}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48688 [ 458.079817s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.255µs [ 458.079826s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 458.079834s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 458.079841s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48690}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 458.079859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48690}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48690 [ 458.079872s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: hyper::proto::h1::io: parsed 4 headers [ 458.079880s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: hyper::proto::h1::conn: incoming body is empty [ 458.079889s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48688}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 458.079893s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39950 [ 458.079970s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: hyper::proto::h1::io: flushed 106 bytes [ 458.079979s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48690}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 458.079997s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 458.080027s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39950}: linkerd_app_core::serve: Connection closed [ 458.080049s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 458.080049s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48688}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44292 keepalive=None [ 458.080083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48688}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 458.080063s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.089µs [ 458.080131s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 458.080139s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 458.080137s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48690}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44294 keepalive=None [ 458.080169s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: hyper::proto::h1::io: parsed 4 headers [ 458.080194s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: hyper::proto::h1::conn: incoming body is empty [ 458.080183s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48690}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 458.080201s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:39958 [ 458.080256s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: hyper::proto::h1::io: flushed 107 bytes [ 458.080277s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 458.080294s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:39958}: linkerd_app_core::serve: Connection closed [ 458.083089s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48690}: linkerd_app_core::serve: Connection closed [ 458.083155s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48688}: linkerd_app_core::serve: Connection closed [ 458.674559s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(91), flags: (0x5: END_HEADERS | END_STREAM) } [ 458.674613s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 458.675554s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(91), flags: (0x4: END_HEADERS) } [ 458.675582s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(91), flags: (0x1: END_STREAM) } [ 463.079620s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48762}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 463.079659s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48762}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48762 [ 463.079702s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48764}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 463.079715s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48764}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48764 [ 463.079740s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48762}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 463.079822s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48764}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 463.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48762}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44362 keepalive=None [ 463.079899s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48762}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 463.079925s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48764}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44364 keepalive=None [ 463.079929s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48764}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 463.082963s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48764}: linkerd_app_core::serve: Connection closed [ 463.083013s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48762}: linkerd_app_core::serve: Connection closed [ 468.079399s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48840}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 468.079436s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 468.079445s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48840}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48840 [ 468.079463s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.586µs [ 468.079475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 468.079484s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 468.079486s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48844}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 468.079496s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48844}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48844 [ 468.079515s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: hyper::proto::h1::io: parsed 4 headers [ 468.079518s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: hyper::proto::h1::conn: incoming body is empty [ 468.079530s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 468.079530s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40108 [ 468.079606s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48844}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 468.079609s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: hyper::proto::h1::io: flushed 106 bytes [ 468.079633s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 468.079657s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40108}: linkerd_app_core::serve: Connection closed [ 468.079687s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 468.079659s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44442 keepalive=None [ 468.079698s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48840}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 468.079700s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.327µs [ 468.079705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 468.079709s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 468.079724s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: hyper::proto::h1::io: parsed 4 headers [ 468.079727s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: hyper::proto::h1::conn: incoming body is empty [ 468.079732s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40102 [ 468.079736s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48844}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44444 keepalive=None [ 468.079761s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48844}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 468.079805s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: hyper::proto::h1::io: flushed 107 bytes [ 468.079821s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 468.079832s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40102}: linkerd_app_core::serve: Connection closed [ 468.082558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48844}: linkerd_app_core::serve: Connection closed [ 468.082610s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48840}: linkerd_app_core::serve: Connection closed [ 468.674253s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(93), flags: (0x5: END_HEADERS | END_STREAM) } [ 468.674304s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 468.675292s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(93), flags: (0x4: END_HEADERS) } [ 468.675323s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(93), flags: (0x1: END_STREAM) } [ 470.336735s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 470.336816s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 470.336826s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 473.078949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48902}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 473.078995s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48902}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48902 [ 473.079039s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48900}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 473.079054s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48900}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48900 [ 473.079097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48902}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 473.079218s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48900}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 473.079280s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48902}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44500 keepalive=None [ 473.079294s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48902}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 473.079313s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48900}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44502 keepalive=None [ 473.079322s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48900}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 473.082320s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48902}: linkerd_app_core::serve: Connection closed [ 473.082375s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48900}: linkerd_app_core::serve: Connection closed [ 478.079192s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48984}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 478.079239s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 478.079240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48984}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48984 [ 478.079261s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.805µs [ 478.079270s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 478.079278s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 478.079280s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48982}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 478.079292s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48982}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:48982 [ 478.079309s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: hyper::proto::h1::io: parsed 4 headers [ 478.079313s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: hyper::proto::h1::conn: incoming body is empty [ 478.079325s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48984}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 478.079324s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40246 [ 478.079411s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: hyper::proto::h1::io: flushed 107 bytes [ 478.079420s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48982}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 478.079433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 478.079457s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40246}: linkerd_app_core::serve: Connection closed [ 478.079465s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 478.079471s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48984}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44586 keepalive=None [ 478.079477s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48984}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 478.079482s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.778µs [ 478.079487s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 478.079491s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 478.079498s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48982}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44588 keepalive=None [ 478.079503s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48982}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 478.079507s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: hyper::proto::h1::io: parsed 4 headers [ 478.079510s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: hyper::proto::h1::conn: incoming body is empty [ 478.079515s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40244 [ 478.079608s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: hyper::proto::h1::io: flushed 106 bytes [ 478.079635s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 478.079652s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40244}: linkerd_app_core::serve: Connection closed [ 478.082339s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48982}: linkerd_app_core::serve: Connection closed [ 478.082397s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:48984}: linkerd_app_core::serve: Connection closed [ 478.675070s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(95), flags: (0x5: END_HEADERS | END_STREAM) } [ 478.675155s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 478.676053s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(95), flags: (0x4: END_HEADERS) } [ 478.676081s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(95), flags: (0x1: END_STREAM) } [ 480.343346s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 480.343427s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 480.343436s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 483.079232s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49052}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 483.079274s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49052}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49052 [ 483.079327s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49050}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 483.079347s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49050}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49050 [ 483.079379s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49052}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 483.079470s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49050}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 483.079543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49052}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44650 keepalive=None [ 483.079557s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49052}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 483.079588s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49050}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44652 keepalive=None [ 483.079604s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49050}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 483.082499s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49050}: linkerd_app_core::serve: Connection closed [ 483.082554s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49052}: linkerd_app_core::serve: Connection closed [ 488.079870s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49136}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 488.079904s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 488.079913s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49136}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49136 [ 488.079929s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.795µs [ 488.079940s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 488.079948s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 488.079955s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49132}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 488.079973s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49132}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49132 [ 488.079981s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: hyper::proto::h1::io: parsed 4 headers [ 488.079985s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: hyper::proto::h1::conn: incoming body is empty [ 488.079994s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40398 [ 488.080002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49136}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 488.080073s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: hyper::proto::h1::io: flushed 107 bytes [ 488.080096s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 488.080110s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49132}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 488.080113s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40398}: linkerd_app_core::serve: Connection closed [ 488.080125s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 488.080135s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.577µs [ 488.080139s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 488.080143s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 488.080156s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: hyper::proto::h1::io: parsed 4 headers [ 488.080167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: hyper::proto::h1::conn: incoming body is empty [ 488.080172s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40396 [ 488.080176s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49136}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44734 keepalive=None [ 488.080184s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49136}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 488.080208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49132}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44736 keepalive=None [ 488.080216s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49132}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 488.080219s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: hyper::proto::h1::io: flushed 106 bytes [ 488.080234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 488.080253s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40396}: linkerd_app_core::serve: Connection closed [ 488.083046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49132}: linkerd_app_core::serve: Connection closed [ 488.083091s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49136}: linkerd_app_core::serve: Connection closed [ 488.674466s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(97), flags: (0x5: END_HEADERS | END_STREAM) } [ 488.674518s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 488.675480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(97), flags: (0x4: END_HEADERS) } [ 488.675514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(97), flags: (0x1: END_STREAM) } [ 490.339826s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 490.339899s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 490.339913s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 493.078950s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49208}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 493.078986s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49208}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49208 [ 493.079027s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49210}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 493.079036s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49210}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49210 [ 493.079060s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49208}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 493.079152s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49210}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 493.079209s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49208}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44806 keepalive=None [ 493.079216s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49208}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 493.079241s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49210}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44808 keepalive=None [ 493.079248s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49210}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 493.084285s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49208}: linkerd_app_core::serve: Connection closed [ 493.084337s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49210}: linkerd_app_core::serve: Connection closed [ 498.079561s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49284}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 498.079603s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 498.079604s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49284}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49284 [ 498.079628s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.616µs [ 498.079638s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 498.079646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 498.079648s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49288}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 498.079663s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49288}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49288 [ 498.079677s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: hyper::proto::h1::io: parsed 4 headers [ 498.079681s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: hyper::proto::h1::conn: incoming body is empty [ 498.079691s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49284}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 498.079693s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40546 [ 498.079764s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: hyper::proto::h1::io: flushed 106 bytes [ 498.079774s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49288}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 498.079788s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 498.079806s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40546}: linkerd_app_core::serve: Connection closed [ 498.079817s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 498.079827s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.178µs [ 498.079832s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 498.079833s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49284}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44886 keepalive=None [ 498.079860s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49284}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 498.079884s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49288}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44888 keepalive=None [ 498.079901s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49288}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 498.079837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 498.079932s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: hyper::proto::h1::io: parsed 4 headers [ 498.079950s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: hyper::proto::h1::conn: incoming body is empty [ 498.079957s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40550 [ 498.080014s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: hyper::proto::h1::io: flushed 107 bytes [ 498.080047s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 498.080060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40550}: linkerd_app_core::serve: Connection closed [ 498.082917s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49288}: linkerd_app_core::serve: Connection closed [ 498.082961s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49284}: linkerd_app_core::serve: Connection closed [ 498.674300s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(99), flags: (0x5: END_HEADERS | END_STREAM) } [ 498.674356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 498.675370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(99), flags: (0x4: END_HEADERS) } [ 498.675396s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(99), flags: (0x1: END_STREAM) } [ 500.345735s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 500.345809s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 500.345823s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 503.079898s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49342}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 503.079955s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49342}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49342 [ 503.079998s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49340}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 503.080015s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49340}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49340 [ 503.080047s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 503.080128s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49340}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 503.080196s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44938 keepalive=None [ 503.080208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49342}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 503.080223s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49340}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:44940 keepalive=None [ 503.080226s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49340}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 503.083255s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49340}: linkerd_app_core::serve: Connection closed [ 503.083507s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49342}: linkerd_app_core::serve: Connection closed [ 508.079902s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49404}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 508.079948s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 508.079965s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49404}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49404 [ 508.079979s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.858µs [ 508.079991s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 508.080001s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 508.080022s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49406}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 508.080086s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: hyper::proto::h1::io: parsed 4 headers [ 508.080101s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: hyper::proto::h1::conn: incoming body is empty [ 508.080081s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49406}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49406 [ 508.080116s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40666 [ 508.080149s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49404}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 508.080213s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: hyper::proto::h1::io: flushed 107 bytes [ 508.080239s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 508.080251s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49406}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 508.080280s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40666}: linkerd_app_core::serve: Connection closed [ 508.080297s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 508.080309s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.398µs [ 508.080314s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 508.080320s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 508.080335s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: hyper::proto::h1::io: parsed 4 headers [ 508.080334s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49404}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45010 keepalive=None [ 508.080353s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49404}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 508.080338s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: hyper::proto::h1::conn: incoming body is empty [ 508.080376s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49406}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45012 keepalive=None [ 508.080372s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40668 [ 508.080382s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49406}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 508.080429s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: hyper::proto::h1::io: flushed 106 bytes [ 508.080449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 508.080467s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40668}: linkerd_app_core::serve: Connection closed [ 508.083424s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49404}: linkerd_app_core::serve: Connection closed [ 508.083917s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49406}: linkerd_app_core::serve: Connection closed [ 508.675086s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(101), flags: (0x5: END_HEADERS | END_STREAM) } [ 508.675169s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 508.676321s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(101), flags: (0x4: END_HEADERS) } [ 508.676347s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(101), flags: (0x1: END_STREAM) } [ 510.341776s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 510.341841s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 510.341853s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 513.079409s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49482}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 513.079444s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49482}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49482 [ 513.079478s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49480}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 513.079489s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49480}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49480 [ 513.079521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49482}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 513.079600s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49480}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 513.079665s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49482}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45080 keepalive=None [ 513.079678s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49482}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 513.079698s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49480}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45082 keepalive=None [ 513.079710s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49480}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 513.082590s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49482}: linkerd_app_core::serve: Connection closed [ 513.082651s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49480}: linkerd_app_core::serve: Connection closed [ 518.079704s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49552}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 518.079747s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49552}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49552 [ 518.079748s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 518.079802s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.534µs [ 518.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 518.079810s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49560}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 518.079822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 518.079834s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49560}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49560 [ 518.079883s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: hyper::proto::h1::io: parsed 4 headers [ 518.079890s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: hyper::proto::h1::conn: incoming body is empty [ 518.079889s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49552}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 518.079904s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40814 [ 518.079971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49560}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 518.080003s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: hyper::proto::h1::io: flushed 106 bytes [ 518.080036s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 518.080033s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49552}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45156 keepalive=None [ 518.080059s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40814}: linkerd_app_core::serve: Connection closed [ 518.080060s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49552}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 518.080089s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 518.080102s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.172µs [ 518.080118s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 518.080121s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49560}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45158 keepalive=None [ 518.080144s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49560}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 518.080124s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 518.080166s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: hyper::proto::h1::io: parsed 4 headers [ 518.080170s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: hyper::proto::h1::conn: incoming body is empty [ 518.080181s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40816 [ 518.080263s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: hyper::proto::h1::io: flushed 107 bytes [ 518.080287s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 518.080302s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40816}: linkerd_app_core::serve: Connection closed [ 518.083256s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49560}: linkerd_app_core::serve: Connection closed [ 518.083314s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49552}: linkerd_app_core::serve: Connection closed [ 518.675192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(103), flags: (0x5: END_HEADERS | END_STREAM) } [ 518.675249s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 518.676354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(103), flags: (0x4: END_HEADERS) } [ 518.676380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(103), flags: (0x1: END_STREAM) } [ 520.337798s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 520.337874s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 520.337896s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 523.079113s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49624}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 523.079170s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49624}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49624 [ 523.079212s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49626}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 523.079226s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49626}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49626 [ 523.079251s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49624}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 523.079337s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49626}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 523.079390s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49624}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45224 keepalive=None [ 523.079404s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49624}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 523.079426s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49626}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45226 keepalive=None [ 523.079430s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49626}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 523.082475s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49626}: linkerd_app_core::serve: Connection closed [ 523.082533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49624}: linkerd_app_core::serve: Connection closed [ 528.079304s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49704}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 528.079343s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49704}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49704 [ 528.079367s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 528.079394s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.564µs [ 528.079414s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 528.079391s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49706}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 528.079437s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 528.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49706}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49706 [ 528.079469s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: hyper::proto::h1::io: parsed 4 headers [ 528.079477s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49704}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 528.079480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: hyper::proto::h1::conn: incoming body is empty [ 528.079532s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40970 [ 528.079583s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49706}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 528.079621s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: hyper::proto::h1::io: flushed 106 bytes [ 528.079643s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 528.079661s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49704}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45304 keepalive=None [ 528.079668s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40970}: linkerd_app_core::serve: Connection closed [ 528.079670s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49704}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 528.079678s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 528.079689s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.937µs [ 528.079701s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 528.079707s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 528.079720s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: hyper::proto::h1::io: parsed 4 headers [ 528.079719s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49706}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45306 keepalive=None [ 528.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49706}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 528.079723s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: hyper::proto::h1::conn: incoming body is empty [ 528.079797s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:40964 [ 528.079877s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: hyper::proto::h1::io: flushed 107 bytes [ 528.079905s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 528.079923s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:40964}: linkerd_app_core::serve: Connection closed [ 528.082724s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49704}: linkerd_app_core::serve: Connection closed [ 528.082775s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49706}: linkerd_app_core::serve: Connection closed [ 528.674425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(105), flags: (0x5: END_HEADERS | END_STREAM) } [ 528.674481s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 528.675603s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(105), flags: (0x4: END_HEADERS) } [ 528.675637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(105), flags: (0x1: END_STREAM) } [ 533.079929s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49756}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 533.079983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49756}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49756 [ 533.080033s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49758}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 533.080056s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49758}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49758 [ 533.080089s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49756}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 533.080179s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49758}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 533.080278s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49756}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45356 keepalive=None [ 533.080307s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49756}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 533.080337s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49758}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45358 keepalive=None [ 533.080343s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49758}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 533.083517s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49758}: linkerd_app_core::serve: Connection closed [ 533.083558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49756}: linkerd_app_core::serve: Connection closed [ 538.079475s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49842}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 538.079512s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 538.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49842}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49842 [ 538.079582s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.41µs [ 538.079597s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49840}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 538.079621s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 538.079634s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49840}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49840 [ 538.079643s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 538.079667s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49842}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 538.079678s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: hyper::proto::h1::io: parsed 4 headers [ 538.079682s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: hyper::proto::h1::conn: incoming body is empty [ 538.079697s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41110 [ 538.079759s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 538.079796s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: hyper::proto::h1::io: flushed 106 bytes [ 538.079821s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 538.079871s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41110}: linkerd_app_core::serve: Connection closed [ 538.079897s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 538.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.436µs [ 538.079913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 538.079830s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49842}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45444 keepalive=None [ 538.079917s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 538.079920s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49842}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 538.079931s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: hyper::proto::h1::io: parsed 4 headers [ 538.079933s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: hyper::proto::h1::conn: incoming body is empty [ 538.079939s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41102 [ 538.079949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45446 keepalive=None [ 538.079983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49840}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 538.080011s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: hyper::proto::h1::io: flushed 107 bytes [ 538.080028s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 538.080061s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41102}: linkerd_app_core::serve: Connection closed [ 538.082979s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49842}: linkerd_app_core::serve: Connection closed [ 538.083027s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49840}: linkerd_app_core::serve: Connection closed [ 538.674606s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(107), flags: (0x5: END_HEADERS | END_STREAM) } [ 538.674666s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 538.675589s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(107), flags: (0x4: END_HEADERS) } [ 538.675619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(107), flags: (0x1: END_STREAM) } [ 543.079813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49908}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 543.079856s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49908}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49908 [ 543.079895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49910}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 543.079904s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49910}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49910 [ 543.079931s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49908}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 543.080019s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49910}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 543.080085s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49908}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45508 keepalive=None [ 543.080104s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49908}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 543.080127s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49910}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45510 keepalive=None [ 543.080133s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49910}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 543.083046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49908}: linkerd_app_core::serve: Connection closed [ 543.083118s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49910}: linkerd_app_core::serve: Connection closed [ 548.079576s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49990}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 548.079615s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 548.079617s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49990}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49990 [ 548.079640s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.223µs [ 548.079649s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 548.079655s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 548.079662s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49988}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 548.079679s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: hyper::proto::h1::io: parsed 4 headers [ 548.079682s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: hyper::proto::h1::conn: incoming body is empty [ 548.079679s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49988}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:49988 [ 548.079691s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41252 [ 548.079710s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49990}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 548.079757s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: hyper::proto::h1::io: flushed 107 bytes [ 548.079775s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 548.079790s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41252}: linkerd_app_core::serve: Connection closed [ 548.079791s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49988}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 548.079796s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 548.079802s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=2.875µs [ 548.079808s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 548.079813s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 548.079828s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: hyper::proto::h1::io: parsed 4 headers [ 548.079842s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: hyper::proto::h1::conn: incoming body is empty [ 548.079849s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41250 [ 548.079853s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49990}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45592 keepalive=None [ 548.079862s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49990}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 548.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49988}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45594 keepalive=None [ 548.079891s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49988}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 548.079913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: hyper::proto::h1::io: flushed 106 bytes [ 548.079930s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 548.079950s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41250}: linkerd_app_core::serve: Connection closed [ 548.082884s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49990}: linkerd_app_core::serve: Connection closed [ 548.082939s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:49988}: linkerd_app_core::serve: Connection closed [ 548.675122s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(109), flags: (0x5: END_HEADERS | END_STREAM) } [ 548.675214s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 548.676318s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(109), flags: (0x4: END_HEADERS) } [ 548.676345s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(109), flags: (0x1: END_STREAM) } [ 550.335452s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 550.335521s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 550.335535s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 553.079474s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50066}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 553.079517s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50066}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50066 [ 553.079569s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50068}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 553.079586s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50068}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50068 [ 553.079623s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50066}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 553.079734s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50068}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 553.079819s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50066}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45666 keepalive=None [ 553.079839s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50066}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 553.079867s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50068}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45668 keepalive=None [ 553.079877s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50068}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 553.082876s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50066}: linkerd_app_core::serve: Connection closed [ 553.082942s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50068}: linkerd_app_core::serve: Connection closed [ 558.079709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50150}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 558.079754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50150}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50150 [ 558.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 558.079786s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.795µs [ 558.079796s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 558.079803s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 558.079802s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50152}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 558.079817s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50152}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50152 [ 558.079840s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: hyper::proto::h1::io: parsed 4 headers [ 558.079853s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50150}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 558.079854s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: hyper::proto::h1::conn: incoming body is empty [ 558.079887s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41418 [ 558.079941s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50152}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 558.079973s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: hyper::proto::h1::io: flushed 107 bytes [ 558.079992s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 558.079999s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50150}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45754 keepalive=None [ 558.080006s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50150}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 558.080010s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41418}: linkerd_app_core::serve: Connection closed [ 558.080021s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 558.080026s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50152}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45756 keepalive=None [ 558.080031s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50152}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 558.080032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.509µs [ 558.080038s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 558.080042s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 558.080068s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: hyper::proto::h1::io: parsed 4 headers [ 558.080071s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: hyper::proto::h1::conn: incoming body is empty [ 558.080076s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41420 [ 558.080133s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: hyper::proto::h1::io: flushed 106 bytes [ 558.080158s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 558.080170s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41420}: linkerd_app_core::serve: Connection closed [ 558.083056s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50150}: linkerd_app_core::serve: Connection closed [ 558.083109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50152}: linkerd_app_core::serve: Connection closed [ 558.675147s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(111), flags: (0x5: END_HEADERS | END_STREAM) } [ 558.675212s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 558.676178s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(111), flags: (0x4: END_HEADERS) } [ 558.676211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(111), flags: (0x1: END_STREAM) } [ 560.345612s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 560.345690s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 560.345701s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 563.079830s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50212}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 563.079873s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50212}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50212 [ 563.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50214}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 563.079926s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50214}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50214 [ 563.079978s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50212}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 563.080066s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50214}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 563.080125s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50212}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45810 keepalive=None [ 563.080151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50212}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 563.080174s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50214}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45812 keepalive=None [ 563.080179s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50214}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 563.085646s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50212}: linkerd_app_core::serve: Connection closed [ 563.085715s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50214}: linkerd_app_core::serve: Connection closed [ 568.079867s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50290}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 568.079918s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 568.079922s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50290}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50290 [ 568.079946s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.997µs [ 568.079955s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 568.079964s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 568.079979s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50288}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 568.079995s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50288}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50288 [ 568.079999s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: hyper::proto::h1::io: parsed 4 headers [ 568.080005s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: hyper::proto::h1::conn: incoming body is empty [ 568.080019s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41550 [ 568.080035s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50290}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 568.080125s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: hyper::proto::h1::io: flushed 107 bytes [ 568.080143s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50288}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 568.080167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 568.080192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41550}: linkerd_app_core::serve: Connection closed [ 568.080209s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 568.080219s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.938µs [ 568.080224s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 568.080229s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 568.080248s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: hyper::proto::h1::io: parsed 4 headers [ 568.080251s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: hyper::proto::h1::conn: incoming body is empty [ 568.080253s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50290}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45892 keepalive=None [ 568.080255s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41558 [ 568.080262s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50290}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 568.080289s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50288}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45894 keepalive=None [ 568.080294s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50288}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 568.080315s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: hyper::proto::h1::io: flushed 106 bytes [ 568.080332s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 568.080347s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41558}: linkerd_app_core::serve: Connection closed [ 568.083182s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50290}: linkerd_app_core::serve: Connection closed [ 568.083433s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50288}: linkerd_app_core::serve: Connection closed [ 568.675204s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(113), flags: (0x5: END_HEADERS | END_STREAM) } [ 568.675263s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 568.676189s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(113), flags: (0x4: END_HEADERS) } [ 568.676215s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(113), flags: (0x1: END_STREAM) } [ 573.079416s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50356}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 573.079465s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50356}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50356 [ 573.079503s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50358}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 573.079517s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50358}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50358 [ 573.079543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50356}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 573.079640s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50358}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 573.079726s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50356}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45956 keepalive=None [ 573.079743s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50356}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 573.079766s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50358}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:45958 keepalive=None [ 573.079772s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50358}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 573.082516s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50356}: linkerd_app_core::serve: Connection closed [ 573.082567s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50358}: linkerd_app_core::serve: Connection closed [ 578.079302s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50442}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 578.079341s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 578.079362s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50442}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50442 [ 578.079379s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.743µs [ 578.079387s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 578.079393s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 578.079418s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: hyper::proto::h1::io: parsed 4 headers [ 578.079426s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: hyper::proto::h1::conn: incoming body is empty [ 578.079419s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50440}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 578.079431s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50440}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50440 [ 578.079436s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41698 [ 578.079465s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50442}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 578.079519s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: hyper::proto::h1::io: flushed 107 bytes [ 578.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 578.079558s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41698}: linkerd_app_core::serve: Connection closed [ 578.079572s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 578.079579s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50440}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 578.079584s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.939µs [ 578.079609s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 578.079616s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 578.079633s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: hyper::proto::h1::io: parsed 4 headers [ 578.079637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: hyper::proto::h1::conn: incoming body is empty [ 578.079641s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41696 [ 578.079666s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50442}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46038 keepalive=None [ 578.079673s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50442}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 578.079692s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50440}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46040 keepalive=None [ 578.079695s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50440}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 578.079694s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: hyper::proto::h1::io: flushed 106 bytes [ 578.079724s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 578.079744s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41696}: linkerd_app_core::serve: Connection closed [ 578.082581s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50442}: linkerd_app_core::serve: Connection closed [ 578.082630s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50440}: linkerd_app_core::serve: Connection closed [ 578.675190s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(115), flags: (0x5: END_HEADERS | END_STREAM) } [ 578.675250s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 578.676375s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(115), flags: (0x4: END_HEADERS) } [ 578.676401s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(115), flags: (0x1: END_STREAM) } [ 583.079272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50508}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 583.079314s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50508}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50508 [ 583.079364s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50506}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 583.079388s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50506}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50506 [ 583.079426s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50508}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 583.079528s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50506}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 583.079611s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50508}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46106 keepalive=None [ 583.079626s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50508}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 583.079649s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50506}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46108 keepalive=None [ 583.079660s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50506}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 583.082421s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50506}: linkerd_app_core::serve: Connection closed [ 583.082475s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50508}: linkerd_app_core::serve: Connection closed [ 588.079451s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50590}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 588.079522s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50590}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50590 [ 588.079483s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 588.079554s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.106µs [ 588.079562s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50594}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 588.079569s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 588.079572s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50594}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50594 [ 588.079578s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 588.079597s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50590}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 588.079608s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: hyper::proto::h1::io: parsed 4 headers [ 588.079611s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: hyper::proto::h1::conn: incoming body is empty [ 588.079623s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41850 [ 588.079680s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50594}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 588.079703s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: hyper::proto::h1::io: flushed 107 bytes [ 588.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 588.079744s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41850}: linkerd_app_core::serve: Connection closed [ 588.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50590}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46190 keepalive=None [ 588.079754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50590}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 588.079755s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 588.079795s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50594}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46192 keepalive=None [ 588.079818s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50594}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 588.079799s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.599µs [ 588.079866s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 588.079879s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 588.079901s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: hyper::proto::h1::io: parsed 4 headers [ 588.079913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: hyper::proto::h1::conn: incoming body is empty [ 588.079929s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41852 [ 588.080005s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: hyper::proto::h1::io: flushed 106 bytes [ 588.080035s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 588.080057s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41852}: linkerd_app_core::serve: Connection closed [ 588.082695s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50594}: linkerd_app_core::serve: Connection closed [ 588.082735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50590}: linkerd_app_core::serve: Connection closed [ 588.674337s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(117), flags: (0x5: END_HEADERS | END_STREAM) } [ 588.674398s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 588.675476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(117), flags: (0x4: END_HEADERS) } [ 588.675503s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(117), flags: (0x1: END_STREAM) } [ 593.078896s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50646}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 593.078940s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50646}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50646 [ 593.078980s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50648}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 593.078994s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50648}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50648 [ 593.079023s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50646}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 593.079105s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50648}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 593.079192s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50646}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46246 keepalive=None [ 593.079207s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50646}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 593.079229s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50648}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46248 keepalive=None [ 593.079234s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50648}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 593.082191s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50648}: linkerd_app_core::serve: Connection closed [ 593.082230s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50646}: linkerd_app_core::serve: Connection closed [ 598.079082s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50728}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 598.079116s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 598.079155s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50728}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50728 [ 598.079171s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.913µs [ 598.079178s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 598.079185s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 598.079210s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: hyper::proto::h1::io: parsed 4 headers [ 598.079225s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: hyper::proto::h1::conn: incoming body is empty [ 598.079205s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50730}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 598.079258s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50730}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50730 [ 598.079260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41998 [ 598.079296s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50728}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 598.079354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: hyper::proto::h1::io: flushed 107 bytes [ 598.079387s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 598.079413s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41998}: linkerd_app_core::serve: Connection closed [ 598.079416s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50730}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 598.079458s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 598.079494s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.853µs [ 598.079502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 598.079509s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 598.079536s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: hyper::proto::h1::io: parsed 4 headers [ 598.079540s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: hyper::proto::h1::conn: incoming body is empty [ 598.079547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:41996 [ 598.079626s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: hyper::proto::h1::io: flushed 106 bytes [ 598.079628s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50728}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46334 keepalive=None [ 598.079644s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50728}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 598.079653s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 598.079671s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:41996}: linkerd_app_core::serve: Connection closed [ 598.079677s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50730}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46336 keepalive=None [ 598.079712s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50730}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 598.082373s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50728}: linkerd_app_core::serve: Connection closed [ 598.082425s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50730}: linkerd_app_core::serve: Connection closed [ 598.675251s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(119), flags: (0x5: END_HEADERS | END_STREAM) } [ 598.675311s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 598.676354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(119), flags: (0x4: END_HEADERS) } [ 598.676383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(119), flags: (0x1: END_STREAM) } [ 603.079211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50800}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 603.079257s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50800}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50800 [ 603.079297s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50798}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 603.079311s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50798}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50798 [ 603.079340s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50800}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 603.079432s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50798}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 603.079486s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50800}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46398 keepalive=None [ 603.079501s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50800}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 603.079521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50798}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46400 keepalive=None [ 603.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50798}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 603.082591s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50800}: linkerd_app_core::serve: Connection closed [ 603.082646s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50798}: linkerd_app_core::serve: Connection closed [ 608.079635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50874}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 608.079682s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 608.079687s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50874}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50874 [ 608.079710s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.766µs [ 608.079721s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 608.079730s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 608.079734s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50876}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 608.079743s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50876}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50876 [ 608.079764s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: hyper::proto::h1::io: parsed 4 headers [ 608.079785s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: hyper::proto::h1::conn: incoming body is empty [ 608.079765s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50874}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 608.079817s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42136 [ 608.079901s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50876}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 608.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: hyper::proto::h1::io: flushed 106 bytes [ 608.079951s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 608.079976s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42136}: linkerd_app_core::serve: Connection closed [ 608.080005s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 608.080018s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.42µs [ 608.080046s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 608.080015s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50874}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46478 keepalive=None [ 608.080057s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 608.080060s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50874}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 608.080076s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: hyper::proto::h1::io: parsed 4 headers [ 608.080079s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: hyper::proto::h1::conn: incoming body is empty [ 608.080086s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42144 [ 608.080089s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50876}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46480 keepalive=None [ 608.080115s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50876}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 608.080168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: hyper::proto::h1::io: flushed 107 bytes [ 608.080188s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 608.080207s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42144}: linkerd_app_core::serve: Connection closed [ 608.082844s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50876}: linkerd_app_core::serve: Connection closed [ 608.082898s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50874}: linkerd_app_core::serve: Connection closed [ 608.675118s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(121), flags: (0x5: END_HEADERS | END_STREAM) } [ 608.675193s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 608.676352s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(121), flags: (0x4: END_HEADERS) } [ 608.676383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(121), flags: (0x1: END_STREAM) } [ 610.338547s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 610.338625s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 610.338643s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 613.079384s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50954}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 613.079433s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50954}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50954 [ 613.079477s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50956}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 613.079494s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50956}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:50956 [ 613.079528s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50954}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 613.079618s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50956}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 613.079674s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50954}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46554 keepalive=None [ 613.079687s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50954}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 613.079706s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50956}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46556 keepalive=None [ 613.079709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50956}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 613.082815s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50954}: linkerd_app_core::serve: Connection closed [ 613.082871s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:50956}: linkerd_app_core::serve: Connection closed [ 618.079592s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51024}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 618.079645s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51024}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51024 [ 618.079617s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 618.079685s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.195µs [ 618.079688s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51026}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 618.079723s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51026}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51026 [ 618.079710s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 618.079759s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 618.079767s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51024}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 618.079803s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: hyper::proto::h1::io: parsed 4 headers [ 618.079809s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: hyper::proto::h1::conn: incoming body is empty [ 618.079823s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42294 [ 618.079867s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51026}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 618.079911s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: hyper::proto::h1::io: flushed 107 bytes [ 618.079931s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51024}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46628 keepalive=None [ 618.079958s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51024}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 618.079933s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 618.079980s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51026}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46630 keepalive=None [ 618.079989s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51026}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 618.079996s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42294}: linkerd_app_core::serve: Connection closed [ 618.080014s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 618.080025s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.228µs [ 618.080032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 618.080038s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 618.080062s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: hyper::proto::h1::io: parsed 4 headers [ 618.080066s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: hyper::proto::h1::conn: incoming body is empty [ 618.080071s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42286 [ 618.080134s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: hyper::proto::h1::io: flushed 106 bytes [ 618.080158s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 618.080177s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42286}: linkerd_app_core::serve: Connection closed [ 618.082892s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51024}: linkerd_app_core::serve: Connection closed [ 618.082948s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51026}: linkerd_app_core::serve: Connection closed [ 618.675144s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(123), flags: (0x5: END_HEADERS | END_STREAM) } [ 618.675197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 618.676130s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(123), flags: (0x4: END_HEADERS) } [ 618.676157s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(123), flags: (0x1: END_STREAM) } [ 620.343267s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 620.343343s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 620.343356s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 623.078973s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51098}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 623.079008s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51098}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51098 [ 623.079047s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51096}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 623.079061s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51096}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51096 [ 623.079089s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51098}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 623.079195s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51096}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 623.079281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51098}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46696 keepalive=None [ 623.079316s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51098}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 623.079335s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51096}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46698 keepalive=None [ 623.079338s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51096}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 623.082106s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51098}: linkerd_app_core::serve: Connection closed [ 623.082148s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51096}: linkerd_app_core::serve: Connection closed [ 628.079314s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51164}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 628.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 628.079369s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51164}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51164 [ 628.079393s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.708µs [ 628.079405s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 628.079411s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 628.079419s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51166}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 628.079437s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: hyper::proto::h1::io: parsed 4 headers [ 628.079437s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51166}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51166 [ 628.079442s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: hyper::proto::h1::conn: incoming body is empty [ 628.079472s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51164}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 628.079476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42434 [ 628.079556s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51166}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 628.079558s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: hyper::proto::h1::io: flushed 106 bytes [ 628.079615s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 628.079642s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42434}: linkerd_app_core::serve: Connection closed [ 628.079641s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51164}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46768 keepalive=None [ 628.079649s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51164}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 628.079658s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 628.079669s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51166}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46770 keepalive=None [ 628.079718s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51166}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 628.079704s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.94µs [ 628.079727s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 628.079734s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 628.079755s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: hyper::proto::h1::io: parsed 4 headers [ 628.079763s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: hyper::proto::h1::conn: incoming body is empty [ 628.079769s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42426 [ 628.079826s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: hyper::proto::h1::io: flushed 107 bytes [ 628.079848s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 628.079861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42426}: linkerd_app_core::serve: Connection closed [ 628.082497s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51164}: linkerd_app_core::serve: Connection closed [ 628.082963s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51166}: linkerd_app_core::serve: Connection closed [ 628.675092s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(125), flags: (0x5: END_HEADERS | END_STREAM) } [ 628.675166s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 628.676024s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(125), flags: (0x4: END_HEADERS) } [ 628.676052s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(125), flags: (0x1: END_STREAM) } [ 630.338801s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 630.338865s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 630.338879s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 633.079899s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51238}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 633.079936s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51238}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51238 [ 633.079969s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51236}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 633.079977s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51236}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51236 [ 633.080010s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51238}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 633.080103s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51236}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 633.080169s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51238}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46836 keepalive=None [ 633.080185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51238}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 633.080212s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51236}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46838 keepalive=None [ 633.080219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51236}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 633.083010s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51238}: linkerd_app_core::serve: Connection closed [ 633.083411s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51236}: linkerd_app_core::serve: Connection closed [ 638.079735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51310}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 638.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 638.079784s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51310}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51310 [ 638.079804s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.726µs [ 638.079813s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 638.079821s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 638.079829s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51308}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 638.079840s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51308}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51308 [ 638.079852s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: hyper::proto::h1::io: parsed 4 headers [ 638.079856s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: hyper::proto::h1::conn: incoming body is empty [ 638.079874s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51310}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 638.079875s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42570 [ 638.079946s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: hyper::proto::h1::io: flushed 106 bytes [ 638.079960s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51308}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 638.079980s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 638.080001s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42570}: linkerd_app_core::serve: Connection closed [ 638.080013s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 638.080016s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51310}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46914 keepalive=None [ 638.080022s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51310}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 638.080023s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.308µs [ 638.080028s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 638.080033s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 638.080041s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51308}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46916 keepalive=None [ 638.080081s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: hyper::proto::h1::io: parsed 4 headers [ 638.080099s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: hyper::proto::h1::conn: incoming body is empty [ 638.080092s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51308}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 638.080104s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42572 [ 638.080162s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: hyper::proto::h1::io: flushed 107 bytes [ 638.080184s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 638.080199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42572}: linkerd_app_core::serve: Connection closed [ 638.083096s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51308}: linkerd_app_core::serve: Connection closed [ 638.083158s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51310}: linkerd_app_core::serve: Connection closed [ 638.674211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(127), flags: (0x5: END_HEADERS | END_STREAM) } [ 638.674275s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 638.675199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(127), flags: (0x4: END_HEADERS) } [ 638.675225s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(127), flags: (0x1: END_STREAM) } [ 640.338250s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 640.338313s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 640.338325s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 643.079279s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51388}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 643.079344s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51388}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51388 [ 643.079388s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51386}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 643.079405s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51386}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51386 [ 643.079432s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51388}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 643.079522s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51386}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 643.079590s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51388}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46986 keepalive=None [ 643.079608s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51388}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 643.079632s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51386}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:46988 keepalive=None [ 643.079640s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51386}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 643.082497s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51386}: linkerd_app_core::serve: Connection closed [ 643.082550s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51388}: linkerd_app_core::serve: Connection closed [ 648.079184s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51456}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 648.079235s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 648.079236s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51456}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51456 [ 648.079260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.265µs [ 648.079271s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 648.079279s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 648.079285s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51454}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 648.079301s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51454}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51454 [ 648.079311s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: hyper::proto::h1::io: parsed 4 headers [ 648.079317s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: hyper::proto::h1::conn: incoming body is empty [ 648.079327s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51456}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 648.079329s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42716 [ 648.079424s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: hyper::proto::h1::io: flushed 106 bytes [ 648.079429s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51454}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 648.079448s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 648.079470s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42716}: linkerd_app_core::serve: Connection closed [ 648.079493s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 648.079506s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.809µs [ 648.079512s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 648.079517s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 648.079514s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51456}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47058 keepalive=None [ 648.079524s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51456}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 648.079534s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: hyper::proto::h1::io: parsed 4 headers [ 648.079538s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: hyper::proto::h1::conn: incoming body is empty [ 648.079543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42724 [ 648.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51454}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47060 keepalive=None [ 648.079557s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51454}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 648.079601s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: hyper::proto::h1::io: flushed 107 bytes [ 648.079620s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 648.079633s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42724}: linkerd_app_core::serve: Connection closed [ 648.082249s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51456}: linkerd_app_core::serve: Connection closed [ 648.082304s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51454}: linkerd_app_core::serve: Connection closed [ 648.674630s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(129), flags: (0x5: END_HEADERS | END_STREAM) } [ 648.674695s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 648.675695s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(129), flags: (0x4: END_HEADERS) } [ 648.675729s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(129), flags: (0x1: END_STREAM) } [ 653.079360s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51526}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 653.079407s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51526}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51526 [ 653.079441s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51528}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 653.079452s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51528}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51528 [ 653.079476s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51526}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 653.079546s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51528}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 653.079605s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51526}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47126 keepalive=None [ 653.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51526}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 653.079650s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51528}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47128 keepalive=None [ 653.079654s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51528}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 653.082492s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51526}: linkerd_app_core::serve: Connection closed [ 653.082745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51528}: linkerd_app_core::serve: Connection closed [ 658.079054s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51608}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 658.079084s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 658.079109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51608}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51608 [ 658.079149s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.019µs [ 658.079160s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 658.079161s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51610}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 658.079178s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51610}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51610 [ 658.079168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 658.079213s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51608}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 658.079230s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: hyper::proto::h1::io: parsed 4 headers [ 658.079240s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: hyper::proto::h1::conn: incoming body is empty [ 658.079252s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42878 [ 658.079293s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51610}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 658.079352s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: hyper::proto::h1::io: flushed 107 bytes [ 658.079361s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51608}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47212 keepalive=None [ 658.079371s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51608}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 658.079381s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 658.079393s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51610}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47214 keepalive=None [ 658.079397s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51610}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 658.079411s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42878}: linkerd_app_core::serve: Connection closed [ 658.079427s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 658.079442s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.459µs [ 658.079449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 658.079454s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 658.079469s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: hyper::proto::h1::io: parsed 4 headers [ 658.079472s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: hyper::proto::h1::conn: incoming body is empty [ 658.079478s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:42876 [ 658.079537s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: hyper::proto::h1::io: flushed 106 bytes [ 658.079566s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 658.079579s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:42876}: linkerd_app_core::serve: Connection closed [ 658.082295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51608}: linkerd_app_core::serve: Connection closed [ 658.082350s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51610}: linkerd_app_core::serve: Connection closed [ 658.674447s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(131), flags: (0x5: END_HEADERS | END_STREAM) } [ 658.674509s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 658.675539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(131), flags: (0x4: END_HEADERS) } [ 658.675568s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(131), flags: (0x1: END_STREAM) } [ 663.079776s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51680}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 663.079819s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51680}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51680 [ 663.079873s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51680}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 663.079978s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51682}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 4, notify_rx: Notify { state: 5, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc565a998), tail: Some(0x7f8fc565a998) } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 663.079994s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51682}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51682 [ 663.080022s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51680}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47278 keepalive=None [ 663.080027s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51680}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 663.080040s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51682}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 663.080087s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51682}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47280 keepalive=None [ 663.080097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51682}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 663.084802s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51682}: linkerd_app_core::serve: Connection closed [ 663.084859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51680}: linkerd_app_core::serve: Connection closed [ 668.079853s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51756}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 668.079888s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51756}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51756 [ 668.079936s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51762}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 668.079953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51762}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51762 [ 668.079955s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 668.079985s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51756}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 668.079986s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.792µs [ 668.080032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 668.080044s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 668.080077s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: hyper::proto::h1::io: parsed 4 headers [ 668.080087s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: hyper::proto::h1::conn: incoming body is empty [ 668.080090s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51762}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 668.080100s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43022 [ 668.080157s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51756}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47358 keepalive=None [ 668.080171s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51756}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 668.080186s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: hyper::proto::h1::io: flushed 106 bytes [ 668.080193s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51762}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47360 keepalive=None [ 668.080230s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 668.080229s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51762}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 668.080270s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43022}: linkerd_app_core::serve: Connection closed [ 668.080281s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 668.080298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.409µs [ 668.080307s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 668.080312s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 668.080326s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: hyper::proto::h1::io: parsed 4 headers [ 668.080328s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: hyper::proto::h1::conn: incoming body is empty [ 668.080333s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43018 [ 668.080390s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: hyper::proto::h1::io: flushed 107 bytes [ 668.080409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 668.080422s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43018}: linkerd_app_core::serve: Connection closed [ 668.083087s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51756}: linkerd_app_core::serve: Connection closed [ 668.083636s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51762}: linkerd_app_core::serve: Connection closed [ 668.674997s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(133), flags: (0x5: END_HEADERS | END_STREAM) } [ 668.675062s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 668.676125s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(133), flags: (0x4: END_HEADERS) } [ 668.676161s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(133), flags: (0x1: END_STREAM) } [ 670.336768s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 670.336848s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 670.336862s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 673.079959s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51834}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 673.080009s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51834}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51834 [ 673.080049s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51832}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 673.080062s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51832}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51832 [ 673.080088s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51834}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 673.080163s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51832}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 673.080225s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51834}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47432 keepalive=None [ 673.080242s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51834}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 673.080265s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51832}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47434 keepalive=None [ 673.080272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51832}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 673.083253s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51834}: linkerd_app_core::serve: Connection closed [ 673.083349s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51832}: linkerd_app_core::serve: Connection closed [ 678.079153s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51898}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 678.079187s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 678.079196s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51898}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51898 [ 678.079213s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.225µs [ 678.079221s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 678.079227s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 678.079244s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51900}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 678.079251s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: hyper::proto::h1::io: parsed 4 headers [ 678.079277s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: hyper::proto::h1::conn: incoming body is empty [ 678.079263s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51900}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51900 [ 678.079287s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43160 [ 678.079310s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51898}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 678.079360s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: hyper::proto::h1::io: flushed 106 bytes [ 678.079387s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 678.079399s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51900}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 678.079407s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43160}: linkerd_app_core::serve: Connection closed [ 678.079420s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 678.079433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.491µs [ 678.079438s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 678.079443s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 678.079458s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: hyper::proto::h1::io: parsed 4 headers [ 678.079461s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: hyper::proto::h1::conn: incoming body is empty [ 678.079467s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43168 [ 678.079472s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51898}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47502 keepalive=None [ 678.079479s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51898}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 678.079499s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51900}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47504 keepalive=None [ 678.079509s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51900}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 678.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: hyper::proto::h1::io: flushed 107 bytes [ 678.079564s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 678.079577s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43168}: linkerd_app_core::serve: Connection closed [ 678.082178s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51898}: linkerd_app_core::serve: Connection closed [ 678.082228s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51900}: linkerd_app_core::serve: Connection closed [ 678.675050s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(135), flags: (0x5: END_HEADERS | END_STREAM) } [ 678.675099s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 678.676045s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(135), flags: (0x4: END_HEADERS) } [ 678.676072s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(135), flags: (0x1: END_STREAM) } [ 683.079482s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51968}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 683.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51968}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51968 [ 683.079561s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51970}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 683.079570s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51970}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:51970 [ 683.079590s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51968}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 683.079652s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51970}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 683.079709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51968}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47568 keepalive=None [ 683.079721s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51968}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 683.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51970}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47570 keepalive=None [ 683.079754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51970}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 683.082754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51968}: linkerd_app_core::serve: Connection closed [ 683.082858s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:51970}: linkerd_app_core::serve: Connection closed [ 688.079849s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52034}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 688.079876s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 688.079901s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52034}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52034 [ 688.079924s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=11.071µs [ 688.079936s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 688.079953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52036}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 688.079965s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 688.079967s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52036}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52036 [ 688.079999s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: hyper::proto::h1::io: parsed 4 headers [ 688.080017s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: hyper::proto::h1::conn: incoming body is empty [ 688.080002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52034}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 688.080040s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43302 [ 688.080128s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: hyper::proto::h1::io: flushed 106 bytes [ 688.080139s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52036}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 688.080168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 688.080197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43302}: linkerd_app_core::serve: Connection closed [ 688.080212s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 688.080222s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52034}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47636 keepalive=None [ 688.080230s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52034}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 688.080230s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.329µs [ 688.080235s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 688.080240s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 688.080257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: hyper::proto::h1::io: parsed 4 headers [ 688.080257s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52036}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47638 keepalive=None [ 688.080260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: hyper::proto::h1::conn: incoming body is empty [ 688.080261s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52036}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 688.080266s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43296 [ 688.080343s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: hyper::proto::h1::io: flushed 107 bytes [ 688.080376s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 688.080393s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43296}: linkerd_app_core::serve: Connection closed [ 688.083037s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52036}: linkerd_app_core::serve: Connection closed [ 688.083087s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52034}: linkerd_app_core::serve: Connection closed [ 688.675160s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(137), flags: (0x5: END_HEADERS | END_STREAM) } [ 688.675218s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 688.676177s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(137), flags: (0x4: END_HEADERS) } [ 688.676209s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(137), flags: (0x1: END_STREAM) } [ 690.339590s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 690.339656s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 690.339669s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 693.079086s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52100}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 693.079145s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52100}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52100 [ 693.079194s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52102}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 693.079212s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52102}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52102 [ 693.079251s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52100}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 693.079344s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52102}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 693.079435s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52100}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47700 keepalive=None [ 693.079452s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52100}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 693.079472s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52102}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47702 keepalive=None [ 693.079477s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52102}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 693.082264s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52100}: linkerd_app_core::serve: Connection closed [ 693.082335s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52102}: linkerd_app_core::serve: Connection closed [ 698.079816s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52182}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 698.079855s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 698.079857s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52182}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52182 [ 698.079880s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.814µs [ 698.079890s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 698.079898s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 698.079899s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52180}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 698.079911s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52180}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52180 [ 698.079930s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: hyper::proto::h1::io: parsed 4 headers [ 698.079938s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52182}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 698.079939s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: hyper::proto::h1::conn: incoming body is empty [ 698.079952s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43442 [ 698.080019s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52180}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 698.080037s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: hyper::proto::h1::io: flushed 106 bytes [ 698.080060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 698.080080s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43442}: linkerd_app_core::serve: Connection closed [ 698.080083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52182}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47782 keepalive=None [ 698.080091s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 698.080091s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52182}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 698.080110s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.098µs [ 698.080112s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52180}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47784 keepalive=None [ 698.080116s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 698.080116s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52180}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 698.080121s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 698.080139s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: hyper::proto::h1::io: parsed 4 headers [ 698.080143s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: hyper::proto::h1::conn: incoming body is empty [ 698.080149s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43448 [ 698.080211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: hyper::proto::h1::io: flushed 107 bytes [ 698.080235s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 698.080251s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43448}: linkerd_app_core::serve: Connection closed [ 698.082907s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52180}: linkerd_app_core::serve: Connection closed [ 698.082953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52182}: linkerd_app_core::serve: Connection closed [ 698.674455s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(139), flags: (0x5: END_HEADERS | END_STREAM) } [ 698.674510s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 698.675474s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(139), flags: (0x4: END_HEADERS) } [ 698.675501s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(139), flags: (0x1: END_STREAM) } [ 703.079217s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52258}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 703.079256s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52258}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52258 [ 703.079305s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52256}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 703.079325s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52256}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52256 [ 703.079358s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52258}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 703.079449s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52256}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 703.079530s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52258}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47856 keepalive=None [ 703.079541s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52258}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 703.079612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52256}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47858 keepalive=None [ 703.079624s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52256}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 703.082362s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52258}: linkerd_app_core::serve: Connection closed [ 703.082409s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52256}: linkerd_app_core::serve: Connection closed [ 708.079122s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52326}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 708.079182s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52326}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52326 [ 708.079219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52324}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 708.079235s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52324}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52324 [ 708.079265s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52326}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 708.079352s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52324}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 708.079414s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 708.079416s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52326}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47928 keepalive=None [ 708.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52326}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 708.079461s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.584µs [ 708.079470s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 708.079476s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52324}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47930 keepalive=None [ 708.079479s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 708.079481s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52324}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 708.079513s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: hyper::proto::h1::io: parsed 4 headers [ 708.079518s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: hyper::proto::h1::conn: incoming body is empty [ 708.079530s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43586 [ 708.079585s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: hyper::proto::h1::io: flushed 107 bytes [ 708.079599s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 708.079615s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43586}: linkerd_app_core::serve: Connection closed [ 708.079626s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 708.079634s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=2.876µs [ 708.079637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 708.079641s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 708.079651s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: hyper::proto::h1::io: parsed 4 headers [ 708.079653s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: hyper::proto::h1::conn: incoming body is empty [ 708.079657s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43594 [ 708.079704s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: hyper::proto::h1::io: flushed 106 bytes [ 708.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 708.079732s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43594}: linkerd_app_core::serve: Connection closed [ 708.082415s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52324}: linkerd_app_core::serve: Connection closed [ 708.082460s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52326}: linkerd_app_core::serve: Connection closed [ 708.674940s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(141), flags: (0x5: END_HEADERS | END_STREAM) } [ 708.675001s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 708.675859s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(141), flags: (0x4: END_HEADERS) } [ 708.675893s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(141), flags: (0x1: END_STREAM) } [ 713.079273s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52394}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 713.079333s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52394}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52394 [ 713.079382s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52392}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 713.079400s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52392}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52392 [ 713.079433s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52394}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 713.079525s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52392}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 713.079599s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52394}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47992 keepalive=None [ 713.079612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52394}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 713.079632s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52392}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:47994 keepalive=None [ 713.079640s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52392}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 713.082554s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52394}: linkerd_app_core::serve: Connection closed [ 713.082968s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52392}: linkerd_app_core::serve: Connection closed [ 718.079198s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52474}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 718.079237s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 718.079252s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52474}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52474 [ 718.079272s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.497µs [ 718.079283s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 718.079291s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 718.079295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52476}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 718.079303s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52476}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52476 [ 718.079324s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52474}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 718.079327s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: hyper::proto::h1::io: parsed 4 headers [ 718.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: hyper::proto::h1::conn: incoming body is empty [ 718.079359s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43736 [ 718.079402s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52476}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 718.079455s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: hyper::proto::h1::io: flushed 107 bytes [ 718.079460s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52474}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48078 keepalive=None [ 718.079469s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52474}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 718.079485s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 718.079495s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52476}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48080 keepalive=None [ 718.079500s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52476}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 718.079506s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43736}: linkerd_app_core::serve: Connection closed [ 718.079518s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 718.079529s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.027µs [ 718.079534s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 718.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 718.079555s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: hyper::proto::h1::io: parsed 4 headers [ 718.079558s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: hyper::proto::h1::conn: incoming body is empty [ 718.079564s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43740 [ 718.079623s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: hyper::proto::h1::io: flushed 106 bytes [ 718.079649s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 718.079670s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43740}: linkerd_app_core::serve: Connection closed [ 718.082193s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52474}: linkerd_app_core::serve: Connection closed [ 718.082295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52476}: linkerd_app_core::serve: Connection closed [ 718.675199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(143), flags: (0x5: END_HEADERS | END_STREAM) } [ 718.675264s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 718.676180s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(143), flags: (0x4: END_HEADERS) } [ 718.676214s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(143), flags: (0x1: END_STREAM) } [ 723.079838s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52544}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 723.079882s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52544}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52544 [ 723.079925s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52546}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 723.079942s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52546}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52546 [ 723.079971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52544}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 723.080067s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52546}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 723.080126s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52544}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48144 keepalive=None [ 723.080138s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52544}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 723.080194s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52546}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48146 keepalive=None [ 723.080208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52546}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 723.082780s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52546}: linkerd_app_core::serve: Connection closed [ 723.082827s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52544}: linkerd_app_core::serve: Connection closed [ 728.079716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52624}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 728.079759s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 728.079766s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52624}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52624 [ 728.079781s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.951µs [ 728.079788s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 728.079794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 728.079818s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52630}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 728.079827s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: hyper::proto::h1::io: parsed 4 headers [ 728.079840s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52630}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52630 [ 728.079845s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: hyper::proto::h1::conn: incoming body is empty [ 728.079855s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43886 [ 728.079866s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52624}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 728.079916s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: hyper::proto::h1::io: flushed 106 bytes [ 728.079942s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 728.079952s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52630}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 728.079961s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43886}: linkerd_app_core::serve: Connection closed [ 728.079972s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 728.079983s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.958µs [ 728.079988s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 728.079993s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 728.080007s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: hyper::proto::h1::io: parsed 4 headers [ 728.080011s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: hyper::proto::h1::conn: incoming body is empty [ 728.080016s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:43890 [ 728.080027s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52624}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48226 keepalive=None [ 728.080036s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52624}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 728.080059s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52630}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48228 keepalive=None [ 728.080073s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52630}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 728.080085s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: hyper::proto::h1::io: flushed 107 bytes [ 728.080119s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 728.080146s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:43890}: linkerd_app_core::serve: Connection closed [ 728.082733s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52624}: linkerd_app_core::serve: Connection closed [ 728.083296s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52630}: linkerd_app_core::serve: Connection closed [ 728.674771s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(145), flags: (0x5: END_HEADERS | END_STREAM) } [ 728.674829s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 728.675806s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(145), flags: (0x4: END_HEADERS) } [ 728.675834s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(145), flags: (0x1: END_STREAM) } [ 730.335827s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 730.335898s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 730.335908s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 733.078982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52698}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 733.079035s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52698}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52698 [ 733.079084s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52700}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 733.079098s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52700}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52700 [ 733.079153s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52698}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 733.079252s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52700}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 733.079330s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52698}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48296 keepalive=None [ 733.079345s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52698}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 733.079374s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52700}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48298 keepalive=None [ 733.079386s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52700}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 733.082019s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52698}: linkerd_app_core::serve: Connection closed [ 733.082423s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52700}: linkerd_app_core::serve: Connection closed [ 738.078980s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52766}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 738.079032s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52766}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52766 [ 738.079038s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 738.079077s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.546µs [ 738.079093s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 738.079101s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 738.079090s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52770}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 738.079147s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52770}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52770 [ 738.079168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: hyper::proto::h1::io: parsed 4 headers [ 738.079173s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: hyper::proto::h1::conn: incoming body is empty [ 738.079181s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52766}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 738.079186s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44030 [ 738.079265s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: hyper::proto::h1::io: flushed 107 bytes [ 738.079286s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52770}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 738.079289s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 738.079314s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44030}: linkerd_app_core::serve: Connection closed [ 738.079325s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 738.079335s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.437µs [ 738.079339s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 738.079345s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 738.079360s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: hyper::proto::h1::io: parsed 4 headers [ 738.079363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: hyper::proto::h1::conn: incoming body is empty [ 738.079387s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44034 [ 738.079398s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52766}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48368 keepalive=None [ 738.079408s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52766}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 738.079431s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52770}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48370 keepalive=None [ 738.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52770}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 738.079447s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: hyper::proto::h1::io: flushed 106 bytes [ 738.079464s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 738.079480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44034}: linkerd_app_core::serve: Connection closed [ 738.081980s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52766}: linkerd_app_core::serve: Connection closed [ 738.082033s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52770}: linkerd_app_core::serve: Connection closed [ 738.674152s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(147), flags: (0x5: END_HEADERS | END_STREAM) } [ 738.674199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 738.675087s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(147), flags: (0x4: END_HEADERS) } [ 738.675115s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(147), flags: (0x1: END_STREAM) } [ 743.079816s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52840}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 743.079862s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52840}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52840 [ 743.079895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52838}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 743.079903s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52838}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52838 [ 743.079926s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 743.079985s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52838}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 743.080038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48436 keepalive=None [ 743.080045s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52840}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 743.080065s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52838}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48438 keepalive=None [ 743.080069s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52838}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 743.082760s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52838}: linkerd_app_core::serve: Connection closed [ 743.082811s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52840}: linkerd_app_core::serve: Connection closed [ 748.079392s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52908}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 748.079435s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 748.079446s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52908}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52908 [ 748.079465s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.356µs [ 748.079473s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 748.079480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 748.079492s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52914}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 748.079506s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52914}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52914 [ 748.079511s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: hyper::proto::h1::io: parsed 4 headers [ 748.079527s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: hyper::proto::h1::conn: incoming body is empty [ 748.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52908}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 748.079543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44174 [ 748.079616s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52914}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 748.079640s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: hyper::proto::h1::io: flushed 106 bytes [ 748.079670s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 748.079693s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52908}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48510 keepalive=None [ 748.079704s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52908}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 748.079708s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44174}: linkerd_app_core::serve: Connection closed [ 748.079726s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 748.079727s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52914}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48512 keepalive=None [ 748.079732s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52914}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 748.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.58µs [ 748.079747s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 748.079754s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 748.079774s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: hyper::proto::h1::io: parsed 4 headers [ 748.079786s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: hyper::proto::h1::conn: incoming body is empty [ 748.079794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44170 [ 748.079862s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: hyper::proto::h1::io: flushed 107 bytes [ 748.079891s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 748.079913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44170}: linkerd_app_core::serve: Connection closed [ 748.082434s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52914}: linkerd_app_core::serve: Connection closed [ 748.082489s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52908}: linkerd_app_core::serve: Connection closed [ 748.674192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(149), flags: (0x5: END_HEADERS | END_STREAM) } [ 748.674248s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 748.675242s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(149), flags: (0x4: END_HEADERS) } [ 748.675268s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(149), flags: (0x1: END_STREAM) } [ 750.339145s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 750.339210s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 750.339219s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 753.079013s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52984}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 753.079056s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52984}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52984 [ 753.079094s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52982}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 753.079103s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52982}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:52982 [ 753.079170s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52984}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 753.079281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52982}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 753.079377s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52984}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48580 keepalive=None [ 753.079397s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52984}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 753.079436s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52982}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48582 keepalive=None [ 753.079448s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52982}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 753.082077s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52982}: linkerd_app_core::serve: Connection closed [ 753.082129s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:52984}: linkerd_app_core::serve: Connection closed [ 758.079420s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 758.079400s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53058}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 758.079464s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.043µs [ 758.079475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 758.079467s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53058}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53058 [ 758.079483s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 758.079510s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: hyper::proto::h1::io: parsed 4 headers [ 758.079513s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: hyper::proto::h1::conn: incoming body is empty [ 758.079512s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53056}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 758.079523s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44320 [ 758.079539s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53056}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53056 [ 758.079578s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53058}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 758.079614s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: hyper::proto::h1::io: flushed 106 bytes [ 758.079636s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 758.079666s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44320}: linkerd_app_core::serve: Connection closed [ 758.079678s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 758.079690s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.586µs [ 758.079702s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 758.079707s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 758.079709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53056}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 758.079725s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: hyper::proto::h1::io: parsed 4 headers [ 758.079732s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: hyper::proto::h1::conn: incoming body is empty [ 758.079738s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44318 [ 758.079794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: hyper::proto::h1::io: flushed 107 bytes [ 758.079825s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 758.079823s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53058}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48662 keepalive=None [ 758.079833s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53058}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 758.079840s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44318}: linkerd_app_core::serve: Connection closed [ 758.079856s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53056}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48664 keepalive=None [ 758.079861s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53056}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 758.082476s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53058}: linkerd_app_core::serve: Connection closed [ 758.082535s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53056}: linkerd_app_core::serve: Connection closed [ 758.674318s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(151), flags: (0x5: END_HEADERS | END_STREAM) } [ 758.674386s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 758.675431s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(151), flags: (0x4: END_HEADERS) } [ 758.675461s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(151), flags: (0x1: END_STREAM) } [ 763.079362s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53134}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 763.079414s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53134}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53134 [ 763.079471s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53132}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 763.079491s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53132}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53132 [ 763.079533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53134}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 763.079638s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53132}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 763.079718s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53134}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48732 keepalive=None [ 763.079732s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53134}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 763.079756s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53132}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48734 keepalive=None [ 763.079762s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53132}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 763.082326s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53132}: linkerd_app_core::serve: Connection closed [ 763.082375s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53134}: linkerd_app_core::serve: Connection closed [ 768.079165s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53202}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 768.079192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 768.079215s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53202}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53202 [ 768.079234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.123µs [ 768.079242s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 768.079250s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 768.079269s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53204}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 768.079282s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: hyper::proto::h1::io: parsed 4 headers [ 768.079287s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: hyper::proto::h1::conn: incoming body is empty [ 768.079284s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53204}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53204 [ 768.079298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44472 [ 768.079321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53202}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 768.079376s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: hyper::proto::h1::io: flushed 107 bytes [ 768.079404s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 768.079422s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44472}: linkerd_app_core::serve: Connection closed [ 768.079421s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53204}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 768.079470s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 768.079508s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.641µs [ 768.079517s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 768.079523s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 768.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: hyper::proto::h1::io: parsed 4 headers [ 768.079544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: hyper::proto::h1::conn: incoming body is empty [ 768.079550s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44464 [ 768.079585s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53202}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48806 keepalive=None [ 768.079599s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53202}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 768.079619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: hyper::proto::h1::io: flushed 106 bytes [ 768.079621s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53204}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48808 keepalive=None [ 768.079642s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53204}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 768.079651s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 768.079676s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44464}: linkerd_app_core::serve: Connection closed [ 768.082087s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53202}: linkerd_app_core::serve: Connection closed [ 768.082127s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53204}: linkerd_app_core::serve: Connection closed [ 768.674795s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(153), flags: (0x5: END_HEADERS | END_STREAM) } [ 768.674864s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 768.675745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(153), flags: (0x4: END_HEADERS) } [ 768.675780s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(153), flags: (0x1: END_STREAM) } [ 770.336867s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 770.336951s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 770.336963s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 773.079642s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53270}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 773.079678s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53270}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53270 [ 773.079712s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53268}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 773.079729s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53268}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53268 [ 773.079763s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53270}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 773.079851s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53268}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 773.079938s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53270}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48868 keepalive=None [ 773.079944s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53270}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 773.079962s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53268}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48870 keepalive=None [ 773.079967s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53268}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 773.082595s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53268}: linkerd_app_core::serve: Connection closed [ 773.082919s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53270}: linkerd_app_core::serve: Connection closed [ 778.079842s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53352}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 778.079880s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 778.079902s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53352}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53352 [ 778.079929s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.478µs [ 778.079938s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 778.079945s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 778.079944s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53354}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 778.079958s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53354}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53354 [ 778.079972s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: hyper::proto::h1::io: parsed 4 headers [ 778.079982s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: hyper::proto::h1::conn: incoming body is empty [ 778.079983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53352}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 778.079992s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44616 [ 778.080079s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53354}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 778.080083s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: hyper::proto::h1::io: flushed 106 bytes [ 778.080175s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53352}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48956 keepalive=None [ 778.080178s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 778.080185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53352}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 778.080203s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44616}: linkerd_app_core::serve: Connection closed [ 778.080217s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 778.080225s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.046µs [ 778.080242s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 778.080241s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53354}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:48958 keepalive=None [ 778.080248s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53354}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 778.080249s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 778.080268s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: hyper::proto::h1::io: parsed 4 headers [ 778.080273s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: hyper::proto::h1::conn: incoming body is empty [ 778.080291s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44614 [ 778.080359s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: hyper::proto::h1::io: flushed 107 bytes [ 778.080402s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 778.080424s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44614}: linkerd_app_core::serve: Connection closed [ 778.082639s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53352}: linkerd_app_core::serve: Connection closed [ 778.082686s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53354}: linkerd_app_core::serve: Connection closed [ 778.674335s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(155), flags: (0x5: END_HEADERS | END_STREAM) } [ 778.674392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 778.675356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(155), flags: (0x4: END_HEADERS) } [ 778.675383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(155), flags: (0x1: END_STREAM) } [ 783.079537s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53422}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 783.079588s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53422}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53422 [ 783.079641s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53424}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 783.079655s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53424}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53424 [ 783.079686s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 783.079798s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53424}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 783.079898s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49022 keepalive=None [ 783.079915s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53422}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 783.079947s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53424}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49024 keepalive=None [ 783.079954s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53424}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 783.082683s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53424}: linkerd_app_core::serve: Connection closed [ 783.083282s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53422}: linkerd_app_core::serve: Connection closed [ 788.079191s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53516}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 788.079252s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 788.079249s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53516}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53516 [ 788.079275s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.065µs [ 788.079286s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 788.079296s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 788.079303s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53518}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 788.079322s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53518}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53518 [ 788.079339s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: hyper::proto::h1::io: parsed 4 headers [ 788.079350s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: hyper::proto::h1::conn: incoming body is empty [ 788.079358s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53516}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 788.079363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44786 [ 788.079450s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: hyper::proto::h1::io: flushed 107 bytes [ 788.079461s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53518}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 788.079472s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 788.079491s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44786}: linkerd_app_core::serve: Connection closed [ 788.079502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 788.079514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.797µs [ 788.079518s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 788.079523s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 788.079531s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53516}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49120 keepalive=None [ 788.079537s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53516}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 788.079538s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: hyper::proto::h1::io: parsed 4 headers [ 788.079542s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: hyper::proto::h1::conn: incoming body is empty [ 788.079547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44778 [ 788.079557s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53518}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49122 keepalive=None [ 788.079562s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53518}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 788.079600s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: hyper::proto::h1::io: flushed 106 bytes [ 788.079615s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 788.079627s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44778}: linkerd_app_core::serve: Connection closed [ 788.082503s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53518}: linkerd_app_core::serve: Connection closed [ 788.082547s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53516}: linkerd_app_core::serve: Connection closed [ 788.674225s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(157), flags: (0x5: END_HEADERS | END_STREAM) } [ 788.674286s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 788.675370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(157), flags: (0x4: END_HEADERS) } [ 788.675403s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(157), flags: (0x1: END_STREAM) } [ 790.335826s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 790.335899s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 790.335917s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 793.079627s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53598}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 793.079671s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53598}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53598 [ 793.079722s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53596}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 793.079740s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53596}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53596 [ 793.079775s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53598}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 793.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53596}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 793.079981s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53598}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49194 keepalive=None [ 793.080005s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53598}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 793.080031s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53596}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49196 keepalive=None [ 793.080036s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53596}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 793.082836s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53596}: linkerd_app_core::serve: Connection closed [ 793.082894s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53598}: linkerd_app_core::serve: Connection closed [ 798.079487s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53662}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 798.079527s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 798.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53662}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53662 [ 798.079574s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.825µs [ 798.079586s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 798.079595s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 798.079594s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53664}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 798.079626s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53664}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53664 [ 798.079644s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: hyper::proto::h1::io: parsed 4 headers [ 798.079653s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53662}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 798.079655s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: hyper::proto::h1::conn: incoming body is empty [ 798.079671s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44924 [ 798.079733s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53664}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 798.079770s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: hyper::proto::h1::io: flushed 106 bytes [ 798.079805s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53662}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49268 keepalive=None [ 798.079811s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 798.079835s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53662}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 798.079876s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44924}: linkerd_app_core::serve: Connection closed [ 798.079891s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 798.079901s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.717µs [ 798.079902s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53664}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49270 keepalive=None [ 798.079925s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53664}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 798.079905s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 798.079957s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 798.079989s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: hyper::proto::h1::io: parsed 4 headers [ 798.079994s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: hyper::proto::h1::conn: incoming body is empty [ 798.080001s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:44926 [ 798.080082s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: hyper::proto::h1::io: flushed 107 bytes [ 798.080108s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 798.080141s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:44926}: linkerd_app_core::serve: Connection closed [ 798.082627s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53662}: linkerd_app_core::serve: Connection closed [ 798.082678s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53664}: linkerd_app_core::serve: Connection closed [ 798.675028s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(159), flags: (0x5: END_HEADERS | END_STREAM) } [ 798.675078s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 798.676167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(159), flags: (0x4: END_HEADERS) } [ 798.676195s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(159), flags: (0x1: END_STREAM) } [ 803.079294s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53738}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 803.079343s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53738}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53738 [ 803.079402s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53740}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 803.079424s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53740}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53740 [ 803.079449s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53738}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 803.079518s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53740}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 803.079595s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53738}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49338 keepalive=None [ 803.079613s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53738}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 803.079638s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53740}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49340 keepalive=None [ 803.079647s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53740}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 803.082539s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53738}: linkerd_app_core::serve: Connection closed [ 803.082611s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53740}: linkerd_app_core::serve: Connection closed [ 808.079303s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53814}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 808.079344s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 808.079366s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53814}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53814 [ 808.079392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.275µs [ 808.079406s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 808.079406s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53816}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 808.079432s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 808.079442s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53816}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53816 [ 808.079469s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53814}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 808.079475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: hyper::proto::h1::io: parsed 4 headers [ 808.079479s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: hyper::proto::h1::conn: incoming body is empty [ 808.079490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45078 [ 808.079560s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53816}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 808.079594s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: hyper::proto::h1::io: flushed 107 bytes [ 808.079629s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53814}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49420 keepalive=None [ 808.079655s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53814}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 808.079632s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 808.079685s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53816}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49422 keepalive=None [ 808.079711s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53816}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 808.079685s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45078}: linkerd_app_core::serve: Connection closed [ 808.079753s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 808.079784s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.588µs [ 808.079798s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 808.079805s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 808.079831s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: hyper::proto::h1::io: parsed 4 headers [ 808.079840s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: hyper::proto::h1::conn: incoming body is empty [ 808.079848s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45076 [ 808.079921s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: hyper::proto::h1::io: flushed 106 bytes [ 808.079943s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 808.079962s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45076}: linkerd_app_core::serve: Connection closed [ 808.082370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53816}: linkerd_app_core::serve: Connection closed [ 808.082428s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53814}: linkerd_app_core::serve: Connection closed [ 808.675158s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(161), flags: (0x5: END_HEADERS | END_STREAM) } [ 808.675219s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 808.676415s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(161), flags: (0x4: END_HEADERS) } [ 808.676453s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(161), flags: (0x1: END_STREAM) } [ 808.676719s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=WindowUpdate { stream_id: StreamId(0), size_increment: 350977 } [ 813.079932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53892}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 813.079989s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53892}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53892 [ 813.080040s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53894}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 813.080053s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53894}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53894 [ 813.080084s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53892}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 813.080173s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53894}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 813.080244s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53892}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49492 keepalive=None [ 813.080267s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53892}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 813.080297s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53894}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49494 keepalive=None [ 813.080304s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53894}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 813.083061s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53894}: linkerd_app_core::serve: Connection closed [ 813.083151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53892}: linkerd_app_core::serve: Connection closed [ 818.079227s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53970}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 818.079271s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53970}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53970 [ 818.079291s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 818.079313s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53968}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 818.079319s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.336µs [ 818.079323s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53968}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:53968 [ 818.079327s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 818.079333s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 818.079345s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53970}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 818.079359s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: hyper::proto::h1::io: parsed 4 headers [ 818.079369s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: hyper::proto::h1::conn: incoming body is empty [ 818.079379s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45230 [ 818.079424s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53968}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 818.079456s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: hyper::proto::h1::io: flushed 107 bytes [ 818.079486s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 818.079489s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53970}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49572 keepalive=None [ 818.079496s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53970}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 818.079506s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45230}: linkerd_app_core::serve: Connection closed [ 818.079516s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53968}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49574 keepalive=None [ 818.079519s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 818.079521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53968}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 818.079531s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.188µs [ 818.079538s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 818.079543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 818.079556s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: hyper::proto::h1::io: parsed 4 headers [ 818.079558s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: hyper::proto::h1::conn: incoming body is empty [ 818.079565s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45238 [ 818.079620s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: hyper::proto::h1::io: flushed 106 bytes [ 818.079648s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 818.079661s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45238}: linkerd_app_core::serve: Connection closed [ 818.082286s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53970}: linkerd_app_core::serve: Connection closed [ 818.082353s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:53968}: linkerd_app_core::serve: Connection closed [ 818.674488s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(163), flags: (0x5: END_HEADERS | END_STREAM) } [ 818.674544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 818.675600s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(163), flags: (0x4: END_HEADERS) } [ 818.675633s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(163), flags: (0x1: END_STREAM) } [ 823.079638s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54044}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 823.079675s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54044}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54044 [ 823.079709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54046}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 823.079718s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54046}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54046 [ 823.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54044}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 823.079822s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54046}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 823.079881s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54044}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49644 keepalive=None [ 823.079892s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54044}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 823.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54046}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49646 keepalive=None [ 823.079919s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54046}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 823.082705s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54044}: linkerd_app_core::serve: Connection closed [ 823.082754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54046}: linkerd_app_core::serve: Connection closed [ 828.079208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54108}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 828.079248s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54108}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54108 [ 828.079268s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 828.079293s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54116}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 828.079297s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.057µs [ 828.079312s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54116}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54116 [ 828.079332s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 828.079351s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 828.079368s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54108}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 828.079391s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: hyper::proto::h1::io: parsed 4 headers [ 828.079399s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: hyper::proto::h1::conn: incoming body is empty [ 828.079412s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45372 [ 828.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54116}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 828.079537s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: hyper::proto::h1::io: flushed 106 bytes [ 828.079556s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54108}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49712 keepalive=None [ 828.079567s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54108}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 828.079578s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 828.079595s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54116}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49714 keepalive=None [ 828.079600s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54116}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 828.079604s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45372}: linkerd_app_core::serve: Connection closed [ 828.079648s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 828.079660s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.078µs [ 828.079664s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 828.079671s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 828.079700s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: hyper::proto::h1::io: parsed 4 headers [ 828.079711s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: hyper::proto::h1::conn: incoming body is empty [ 828.079719s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45370 [ 828.079778s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: hyper::proto::h1::io: flushed 107 bytes [ 828.079802s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 828.079819s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45370}: linkerd_app_core::serve: Connection closed [ 828.082460s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54116}: linkerd_app_core::serve: Connection closed [ 828.082521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54108}: linkerd_app_core::serve: Connection closed [ 828.675329s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(165), flags: (0x5: END_HEADERS | END_STREAM) } [ 828.675386s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 828.676412s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(165), flags: (0x4: END_HEADERS) } [ 828.676440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(165), flags: (0x1: END_STREAM) } [ 833.079026s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54182}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 833.079095s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54182}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54182 [ 833.079167s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54180}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 833.079184s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54180}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54180 [ 833.079211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54182}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 833.079280s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54180}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 833.079420s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54182}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49780 keepalive=None [ 833.079437s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54182}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 833.079463s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54180}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49782 keepalive=None [ 833.079469s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54180}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 833.082035s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54182}: linkerd_app_core::serve: Connection closed [ 833.082095s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54180}: linkerd_app_core::serve: Connection closed [ 838.079313s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54270}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 838.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 838.079371s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54270}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54270 [ 838.079394s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.554µs [ 838.079403s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 838.079409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 838.079413s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54278}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 838.079423s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54278}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54278 [ 838.079450s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: hyper::proto::h1::io: parsed 4 headers [ 838.079462s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: hyper::proto::h1::conn: incoming body is empty [ 838.079453s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54270}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 838.079476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45532 [ 838.079551s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: hyper::proto::h1::io: flushed 107 bytes [ 838.079558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54278}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 838.079576s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 838.079595s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45532}: linkerd_app_core::serve: Connection closed [ 838.079622s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 838.079626s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54270}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49874 keepalive=None [ 838.079634s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54270}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 838.079642s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.783µs [ 838.079653s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 838.079658s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 838.079659s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54278}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49876 keepalive=None [ 838.079663s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54278}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 838.079672s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: hyper::proto::h1::io: parsed 4 headers [ 838.079676s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: hyper::proto::h1::conn: incoming body is empty [ 838.079681s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45534 [ 838.079737s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: hyper::proto::h1::io: flushed 106 bytes [ 838.079760s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 838.079772s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45534}: linkerd_app_core::serve: Connection closed [ 838.082180s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54278}: linkerd_app_core::serve: Connection closed [ 838.082222s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54270}: linkerd_app_core::serve: Connection closed [ 838.675214s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(167), flags: (0x5: END_HEADERS | END_STREAM) } [ 838.675276s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 838.676216s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(167), flags: (0x4: END_HEADERS) } [ 838.676242s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(167), flags: (0x1: END_STREAM) } [ 843.079906s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54340}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 843.079945s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54340}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54340 [ 843.079982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54342}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 843.079991s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54342}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54342 [ 843.080020s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54340}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 843.080110s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 843.080185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54340}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49940 keepalive=None [ 843.080211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54340}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 843.080241s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:49942 keepalive=None [ 843.080245s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54342}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 843.082723s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54340}: linkerd_app_core::serve: Connection closed [ 843.082774s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54342}: linkerd_app_core::serve: Connection closed [ 848.079379s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54422}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 848.079416s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 848.079444s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54422}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54422 [ 848.079459s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.662µs [ 848.079470s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 848.079479s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 848.079485s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54424}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 848.079497s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54424}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54424 [ 848.079504s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: hyper::proto::h1::io: parsed 4 headers [ 848.079512s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: hyper::proto::h1::conn: incoming body is empty [ 848.079518s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 848.079522s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45684 [ 848.079596s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: hyper::proto::h1::io: flushed 106 bytes [ 848.079604s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54424}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 848.079627s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 848.079648s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45684}: linkerd_app_core::serve: Connection closed [ 848.079662s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 848.079673s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.648µs [ 848.079679s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 848.079685s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 848.079681s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50028 keepalive=None [ 848.079691s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54422}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 848.079705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: hyper::proto::h1::io: parsed 4 headers [ 848.079708s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: hyper::proto::h1::conn: incoming body is empty [ 848.079717s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54424}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50030 keepalive=None [ 848.079739s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54424}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 848.079714s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45686 [ 848.079822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: hyper::proto::h1::io: flushed 107 bytes [ 848.079841s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 848.079863s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45686}: linkerd_app_core::serve: Connection closed [ 848.082376s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54422}: linkerd_app_core::serve: Connection closed [ 848.082430s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54424}: linkerd_app_core::serve: Connection closed [ 848.674683s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(169), flags: (0x5: END_HEADERS | END_STREAM) } [ 848.674736s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 848.675584s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(169), flags: (0x4: END_HEADERS) } [ 848.675621s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(169), flags: (0x1: END_STREAM) } [ 850.341132s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 850.341224s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 850.341237s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 853.078957s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54508}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 853.079002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54508}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54508 [ 853.079058s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54510}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 853.079074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54510}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54510 [ 853.079111s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54508}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 853.079221s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54510}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 853.079307s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54508}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50108 keepalive=None [ 853.079328s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54508}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 853.079353s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54510}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50110 keepalive=None [ 853.079363s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54510}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 853.081979s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54508}: linkerd_app_core::serve: Connection closed [ 853.082214s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54510}: linkerd_app_core::serve: Connection closed [ 858.079018s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54582}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 858.079052s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 858.079076s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54582}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54582 [ 858.079096s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.216µs [ 858.079106s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 858.079113s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 858.079118s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54584}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 858.079154s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54584}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54584 [ 858.079164s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: hyper::proto::h1::io: parsed 4 headers [ 858.079176s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: hyper::proto::h1::conn: incoming body is empty [ 858.079179s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 858.079190s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45844 [ 858.079265s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 858.079279s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: hyper::proto::h1::io: flushed 106 bytes [ 858.079304s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 858.079333s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45844}: linkerd_app_core::serve: Connection closed [ 858.079336s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50186 keepalive=None [ 858.079367s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54582}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 858.079345s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 858.079413s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50188 keepalive=None [ 858.079418s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54584}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 858.079412s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.374µs [ 858.079423s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 858.079428s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 858.079467s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: hyper::proto::h1::io: parsed 4 headers [ 858.079478s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: hyper::proto::h1::conn: incoming body is empty [ 858.079484s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45846 [ 858.079547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: hyper::proto::h1::io: flushed 107 bytes [ 858.079568s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 858.079588s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45846}: linkerd_app_core::serve: Connection closed [ 858.081941s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54584}: linkerd_app_core::serve: Connection closed [ 858.081979s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54582}: linkerd_app_core::serve: Connection closed [ 858.674721s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(171), flags: (0x5: END_HEADERS | END_STREAM) } [ 858.674777s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 858.675763s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(171), flags: (0x4: END_HEADERS) } [ 858.675791s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(171), flags: (0x1: END_STREAM) } [ 860.344006s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 860.344078s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 860.344089s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 863.079685s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54658}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 863.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54658}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54658 [ 863.079756s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54656}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 863.079763s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54656}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54656 [ 863.079783s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54658}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 863.079848s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54656}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 863.079908s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54658}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50256 keepalive=None [ 863.079922s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54658}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 863.079940s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54656}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50258 keepalive=None [ 863.079950s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54656}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 863.082460s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54656}: linkerd_app_core::serve: Connection closed [ 863.082529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54658}: linkerd_app_core::serve: Connection closed [ 868.079426s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54728}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 868.079472s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 868.079500s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54728}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54728 [ 868.079524s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=11.021µs [ 868.079535s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 868.079543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 868.079578s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: hyper::proto::h1::io: parsed 4 headers [ 868.079592s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: hyper::proto::h1::conn: incoming body is empty [ 868.079568s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54730}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 868.079602s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54730}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54730 [ 868.079605s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45990 [ 868.079651s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54728}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 868.079701s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: hyper::proto::h1::io: flushed 106 bytes [ 868.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 868.079768s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45990}: linkerd_app_core::serve: Connection closed [ 868.079788s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54730}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 868.079792s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 868.079842s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.721µs [ 868.079851s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 868.079857s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 868.079880s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: hyper::proto::h1::io: parsed 4 headers [ 868.079904s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: hyper::proto::h1::conn: incoming body is empty [ 868.079915s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:45998 [ 868.079988s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54728}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50332 keepalive=None [ 868.080019s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54728}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 868.079999s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: hyper::proto::h1::io: flushed 107 bytes [ 868.080072s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54730}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50334 keepalive=None [ 868.080086s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54730}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 868.080097s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 868.080144s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:45998}: linkerd_app_core::serve: Connection closed [ 868.082613s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54730}: linkerd_app_core::serve: Connection closed [ 868.082665s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54728}: linkerd_app_core::serve: Connection closed [ 868.674526s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(173), flags: (0x5: END_HEADERS | END_STREAM) } [ 868.674584s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 868.675476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(173), flags: (0x4: END_HEADERS) } [ 868.675503s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(173), flags: (0x1: END_STREAM) } [ 870.352711s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 870.352774s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 870.352805s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 873.079241s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54846}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 873.079278s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54846}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54846 [ 873.079319s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54844}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 873.079331s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54844}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54844 [ 873.079369s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54846}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 873.079461s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54844}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 873.079541s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54846}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50444 keepalive=None [ 873.079553s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54846}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 873.079577s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54844}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50446 keepalive=None [ 873.079587s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54844}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 873.082164s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54844}: linkerd_app_core::serve: Connection closed [ 873.082219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54846}: linkerd_app_core::serve: Connection closed [ 878.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54920}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 878.079788s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54920}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54920 [ 878.079792s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 878.079821s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.436µs [ 878.079829s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 878.079836s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 878.079830s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54922}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 878.079859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54922}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54922 [ 878.079876s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: hyper::proto::h1::io: parsed 4 headers [ 878.079885s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54920}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 878.079888s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: hyper::proto::h1::conn: incoming body is empty [ 878.079902s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46182 [ 878.079971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54922}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 878.079984s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: hyper::proto::h1::io: flushed 107 bytes [ 878.080008s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 878.080029s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46182}: linkerd_app_core::serve: Connection closed [ 878.080031s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54920}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50524 keepalive=None [ 878.080040s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54920}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 878.080041s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 878.080053s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.129µs [ 878.080056s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54922}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50526 keepalive=None [ 878.080060s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54922}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 878.080060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 878.080067s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 878.080096s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: hyper::proto::h1::io: parsed 4 headers [ 878.080100s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: hyper::proto::h1::conn: incoming body is empty [ 878.080106s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46190 [ 878.080183s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: hyper::proto::h1::io: flushed 106 bytes [ 878.080215s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 878.080237s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46190}: linkerd_app_core::serve: Connection closed [ 878.082439s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54922}: linkerd_app_core::serve: Connection closed [ 878.082517s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54920}: linkerd_app_core::serve: Connection closed [ 878.674353s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(175), flags: (0x5: END_HEADERS | END_STREAM) } [ 878.674414s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 878.675480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(175), flags: (0x4: END_HEADERS) } [ 878.675507s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(175), flags: (0x1: END_STREAM) } [ 880.340704s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 880.340784s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 880.340802s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 883.079296s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54994}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 883.079343s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54994}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54994 [ 883.079393s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54992}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 883.079412s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54992}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:54992 [ 883.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 883.079530s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54992}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 883.079589s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50592 keepalive=None [ 883.079599s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54994}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 883.079617s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54992}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50594 keepalive=None [ 883.079620s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54992}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 883.082265s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54994}: linkerd_app_core::serve: Connection closed [ 883.082758s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:54992}: linkerd_app_core::serve: Connection closed [ 888.079923s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55056}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 888.079959s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 888.079982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55056}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55056 [ 888.080008s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.596µs [ 888.080017s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 888.080030s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 888.080028s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55064}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 888.080046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55064}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55064 [ 888.080063s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: hyper::proto::h1::io: parsed 4 headers [ 888.080071s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: hyper::proto::h1::conn: incoming body is empty [ 888.080080s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55056}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 888.080085s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46320 [ 888.080169s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: hyper::proto::h1::io: flushed 106 bytes [ 888.080181s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55064}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 888.080191s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 888.080212s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46320}: linkerd_app_core::serve: Connection closed [ 888.080224s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 888.080240s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.098µs [ 888.080245s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 888.080242s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55056}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50660 keepalive=None [ 888.080250s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 888.080250s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55056}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 888.080262s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: hyper::proto::h1::io: parsed 4 headers [ 888.080265s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: hyper::proto::h1::conn: incoming body is empty [ 888.080270s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46318 [ 888.080275s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55064}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50662 keepalive=None [ 888.080307s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55064}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 888.080344s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: hyper::proto::h1::io: flushed 107 bytes [ 888.080363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 888.080376s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46318}: linkerd_app_core::serve: Connection closed [ 888.082936s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55064}: linkerd_app_core::serve: Connection closed [ 888.082988s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55056}: linkerd_app_core::serve: Connection closed [ 888.674838s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(177), flags: (0x5: END_HEADERS | END_STREAM) } [ 888.674898s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 888.675868s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(177), flags: (0x4: END_HEADERS) } [ 888.675896s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(177), flags: (0x1: END_STREAM) } [ 893.079633s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55118}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 893.079671s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55118}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55118 [ 893.079707s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55120}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 893.079715s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55120}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55120 [ 893.079738s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55118}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 893.079827s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55120}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 893.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55118}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50716 keepalive=None [ 893.079932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55118}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 893.079965s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55120}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50718 keepalive=None [ 893.079972s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55120}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 893.082640s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55118}: linkerd_app_core::serve: Connection closed [ 893.082687s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55120}: linkerd_app_core::serve: Connection closed [ 898.079801s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55198}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 898.079832s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 898.079856s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55198}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55198 [ 898.079881s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.967µs [ 898.079892s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 898.079900s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 898.079901s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55200}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 898.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55200}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55200 [ 898.079938s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: hyper::proto::h1::io: parsed 4 headers [ 898.079943s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: hyper::proto::h1::conn: incoming body is empty [ 898.079955s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55198}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 898.079955s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46462 [ 898.080045s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: hyper::proto::h1::io: flushed 107 bytes [ 898.080048s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55200}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 898.080091s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 898.080112s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46462}: linkerd_app_core::serve: Connection closed [ 898.080141s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 898.080143s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55198}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50804 keepalive=None [ 898.080150s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55198}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 898.080164s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=17.222µs [ 898.080169s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 898.080171s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55200}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50806 keepalive=None [ 898.080175s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 898.080175s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55200}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 898.080202s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: hyper::proto::h1::io: parsed 4 headers [ 898.080206s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: hyper::proto::h1::conn: incoming body is empty [ 898.080212s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46460 [ 898.080280s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: hyper::proto::h1::io: flushed 106 bytes [ 898.080301s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 898.080319s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46460}: linkerd_app_core::serve: Connection closed [ 898.082606s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55200}: linkerd_app_core::serve: Connection closed [ 898.082643s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55198}: linkerd_app_core::serve: Connection closed [ 898.674445s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(179), flags: (0x5: END_HEADERS | END_STREAM) } [ 898.674502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 898.675445s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(179), flags: (0x4: END_HEADERS) } [ 898.675477s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(179), flags: (0x1: END_STREAM) } [ 903.079413s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55268}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 903.079462s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55268}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55268 [ 903.079505s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55270}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 903.079517s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55270}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55270 [ 903.079545s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55268}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 903.079647s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55270}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 903.079728s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55268}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50868 keepalive=None [ 903.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55268}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 903.079792s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55270}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50870 keepalive=None [ 903.079806s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55270}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 903.082250s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55270}: linkerd_app_core::serve: Connection closed [ 903.082299s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55268}: linkerd_app_core::serve: Connection closed [ 908.079193s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55352}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 908.079251s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 908.079255s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55352}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55352 [ 908.079287s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=11.903µs [ 908.079298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 908.079306s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 908.079315s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55350}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 908.079335s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: hyper::proto::h1::io: parsed 4 headers [ 908.079331s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55350}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55350 [ 908.079339s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: hyper::proto::h1::conn: incoming body is empty [ 908.079349s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46620 [ 908.079378s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55352}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 908.079457s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: hyper::proto::h1::io: flushed 107 bytes [ 908.079498s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 908.079518s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55350}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 908.079530s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46620}: linkerd_app_core::serve: Connection closed [ 908.079549s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 908.079566s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.622µs [ 908.079574s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 908.079580s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 908.079602s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: hyper::proto::h1::io: parsed 4 headers [ 908.079607s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: hyper::proto::h1::conn: incoming body is empty [ 908.079616s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46612 [ 908.079627s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55352}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50954 keepalive=None [ 908.079640s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55352}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 908.079674s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55350}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:50956 keepalive=None [ 908.079680s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55350}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 908.079749s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: hyper::proto::h1::io: flushed 106 bytes [ 908.079788s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 908.079827s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46612}: linkerd_app_core::serve: Connection closed [ 908.082474s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55352}: linkerd_app_core::serve: Connection closed [ 908.082851s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55350}: linkerd_app_core::serve: Connection closed [ 908.675321s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(181), flags: (0x5: END_HEADERS | END_STREAM) } [ 908.675380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 908.676208s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(181), flags: (0x4: END_HEADERS) } [ 908.676235s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(181), flags: (0x1: END_STREAM) } [ 910.341362s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 910.341420s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 910.341440s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 913.079351s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55428}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 913.079387s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55428}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55428 [ 913.079420s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55430}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 913.079430s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55430}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55430 [ 913.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55428}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 913.079551s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55430}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 913.079612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55428}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51028 keepalive=None [ 913.079642s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55428}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 913.079688s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55430}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51030 keepalive=None [ 913.079706s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55430}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 913.082024s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55430}: linkerd_app_core::serve: Connection closed [ 913.082068s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55428}: linkerd_app_core::serve: Connection closed [ 918.079553s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55498}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 918.079585s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 918.079603s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55498}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55498 [ 918.079623s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.943µs [ 918.079633s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 918.079641s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 918.079639s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55500}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 918.079647s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55500}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55500 [ 918.079672s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: hyper::proto::h1::io: parsed 4 headers [ 918.079673s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55498}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 918.079676s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: hyper::proto::h1::conn: incoming body is empty [ 918.079688s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46760 [ 918.079744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55500}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 918.079768s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: hyper::proto::h1::io: flushed 107 bytes [ 918.079798s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55498}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51102 keepalive=None [ 918.079832s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55498}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 918.079834s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 918.079852s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46760}: linkerd_app_core::serve: Connection closed [ 918.079855s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55500}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51104 keepalive=None [ 918.079859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55500}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 918.079863s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 918.079878s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.536µs [ 918.079883s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 918.079901s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 918.079918s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: hyper::proto::h1::io: parsed 4 headers [ 918.079933s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: hyper::proto::h1::conn: incoming body is empty [ 918.079938s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46768 [ 918.079991s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: hyper::proto::h1::io: flushed 106 bytes [ 918.080032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 918.080058s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46768}: linkerd_app_core::serve: Connection closed [ 918.082291s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55500}: linkerd_app_core::serve: Connection closed [ 918.082346s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55498}: linkerd_app_core::serve: Connection closed [ 918.674749s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(183), flags: (0x5: END_HEADERS | END_STREAM) } [ 918.674804s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 918.675898s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(183), flags: (0x4: END_HEADERS) } [ 918.675929s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(183), flags: (0x1: END_STREAM) } [ 920.346265s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 920.346322s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 920.346330s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 923.079533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55570}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 923.079576s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55570}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55570 [ 923.079617s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55568}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 923.079629s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55568}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55568 [ 923.079650s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55570}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 923.079729s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55568}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 923.079788s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55570}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51168 keepalive=None [ 923.079801s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55570}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 923.079851s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55568}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51170 keepalive=None [ 923.079862s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55568}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 923.082281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55570}: linkerd_app_core::serve: Connection closed [ 923.082334s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55568}: linkerd_app_core::serve: Connection closed [ 928.079412s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55648}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 928.079452s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 928.079473s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55648}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55648 [ 928.079494s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.685µs [ 928.079505s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 928.079516s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 928.079526s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55642}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 928.079542s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55642}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55642 [ 928.079552s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: hyper::proto::h1::io: parsed 4 headers [ 928.079561s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: hyper::proto::h1::conn: incoming body is empty [ 928.079573s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55648}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 928.079572s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46904 [ 928.079670s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: hyper::proto::h1::io: flushed 107 bytes [ 928.079684s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55642}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 928.079699s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 928.079725s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46904}: linkerd_app_core::serve: Connection closed [ 928.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 928.079754s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.96µs [ 928.079759s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 928.079757s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55648}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51244 keepalive=None [ 928.079765s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 928.079765s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55648}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 928.079798s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: hyper::proto::h1::io: parsed 4 headers [ 928.079801s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: hyper::proto::h1::conn: incoming body is empty [ 928.079806s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:46906 [ 928.079812s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55642}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51246 keepalive=None [ 928.079848s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55642}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 928.079886s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: hyper::proto::h1::io: flushed 106 bytes [ 928.079907s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 928.079924s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:46906}: linkerd_app_core::serve: Connection closed [ 928.082282s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55642}: linkerd_app_core::serve: Connection closed [ 928.082658s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55648}: linkerd_app_core::serve: Connection closed [ 928.674980s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(185), flags: (0x5: END_HEADERS | END_STREAM) } [ 928.675039s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 928.676031s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(185), flags: (0x4: END_HEADERS) } [ 928.676059s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(185), flags: (0x1: END_STREAM) } [ 930.350845s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 930.350911s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 930.350920s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 933.079246s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55702}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 933.079284s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55702}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55702 [ 933.079319s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55704}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 933.079331s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55704}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55704 [ 933.079367s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55702}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 933.079436s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55704}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 933.079507s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55702}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51302 keepalive=None [ 933.079524s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55702}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 933.079545s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55704}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51304 keepalive=None [ 933.079555s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55704}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 933.082038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55702}: linkerd_app_core::serve: Connection closed [ 933.082106s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55704}: linkerd_app_core::serve: Connection closed [ 938.079109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55782}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 938.079181s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 938.079187s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55782}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55782 [ 938.079202s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.191µs [ 938.079210s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 938.079216s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 938.079241s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: hyper::proto::h1::io: parsed 4 headers [ 938.079246s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: hyper::proto::h1::conn: incoming body is empty [ 938.079245s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55780}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 938.079255s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55780}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55780 [ 938.079256s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47042 [ 938.079281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55782}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 938.079327s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: hyper::proto::h1::io: flushed 106 bytes [ 938.079356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 938.079374s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47042}: linkerd_app_core::serve: Connection closed [ 938.079384s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 938.079387s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55780}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 938.079425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.78µs [ 938.079465s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 938.079473s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 938.079490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: hyper::proto::h1::io: parsed 4 headers [ 938.079492s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: hyper::proto::h1::conn: incoming body is empty [ 938.079498s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47048 [ 938.079528s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55782}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51382 keepalive=None [ 938.079544s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55782}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 938.079568s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55780}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51384 keepalive=None [ 938.079579s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55780}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 938.079589s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: hyper::proto::h1::io: flushed 107 bytes [ 938.079624s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 938.079650s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47048}: linkerd_app_core::serve: Connection closed [ 938.082007s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55780}: linkerd_app_core::serve: Connection closed [ 938.082422s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55782}: linkerd_app_core::serve: Connection closed [ 938.675308s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(187), flags: (0x5: END_HEADERS | END_STREAM) } [ 938.675365s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 938.676363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(187), flags: (0x4: END_HEADERS) } [ 938.676389s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(187), flags: (0x1: END_STREAM) } [ 940.341129s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 940.341196s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 940.341204s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 943.079356s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55850}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 943.079399s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55850}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55850 [ 943.079456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55848}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 943.079473s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55848}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55848 [ 943.079503s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55850}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 943.079590s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55848}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 943.079644s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55850}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51448 keepalive=None [ 943.079651s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55850}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 943.079669s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55848}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51450 keepalive=None [ 943.079673s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55848}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 943.082235s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55848}: linkerd_app_core::serve: Connection closed [ 943.082274s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55850}: linkerd_app_core::serve: Connection closed [ 948.078971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55928}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 948.079002s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 948.079030s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55928}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55928 [ 948.079050s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.328µs [ 948.079059s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 948.079069s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 948.079080s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55920}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 948.079101s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55920}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55920 [ 948.079112s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: hyper::proto::h1::io: parsed 4 headers [ 948.079116s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: hyper::proto::h1::conn: incoming body is empty [ 948.079152s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47182 [ 948.079158s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55928}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 948.079257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: hyper::proto::h1::io: flushed 107 bytes [ 948.079282s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55920}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 948.079300s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 948.079332s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47182}: linkerd_app_core::serve: Connection closed [ 948.079356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 948.079378s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.19µs [ 948.079385s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 948.079392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 948.079401s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55928}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51524 keepalive=None [ 948.079410s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: hyper::proto::h1::io: parsed 4 headers [ 948.079439s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: hyper::proto::h1::conn: incoming body is empty [ 948.079443s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55928}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 948.079447s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47184 [ 948.079472s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55920}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51526 keepalive=None [ 948.079486s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55920}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 948.079511s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: hyper::proto::h1::io: flushed 106 bytes [ 948.079535s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 948.079562s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47184}: linkerd_app_core::serve: Connection closed [ 948.081963s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55920}: linkerd_app_core::serve: Connection closed [ 948.082004s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55928}: linkerd_app_core::serve: Connection closed [ 948.674428s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(189), flags: (0x5: END_HEADERS | END_STREAM) } [ 948.674487s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 948.675582s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(189), flags: (0x4: END_HEADERS) } [ 948.675610s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(189), flags: (0x1: END_STREAM) } [ 950.338068s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 950.338139s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 950.338149s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 953.079721s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55986}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 953.079760s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55986}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55986 [ 953.079801s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55988}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 953.079820s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55988}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:55988 [ 953.079864s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55986}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 953.079941s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55988}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 953.079986s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55986}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51586 keepalive=None [ 953.079991s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55986}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 953.080002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55988}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51588 keepalive=None [ 953.080005s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55988}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 953.084909s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55988}: linkerd_app_core::serve: Connection closed [ 953.084982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:55986}: linkerd_app_core::serve: Connection closed [ 958.079942s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56070}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 958.079997s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56070}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56070 [ 958.080004s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 958.080030s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.434µs [ 958.080038s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 958.080044s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 958.080049s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56072}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 958.080069s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: hyper::proto::h1::io: parsed 4 headers [ 958.080072s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: hyper::proto::h1::conn: incoming body is empty [ 958.080070s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56072}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56072 [ 958.080082s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47334 [ 958.080104s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56070}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 958.080160s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: hyper::proto::h1::io: flushed 107 bytes [ 958.080194s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 958.080209s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56072}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 958.080229s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47334}: linkerd_app_core::serve: Connection closed [ 958.080246s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 958.080258s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.137µs [ 958.080263s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 958.080267s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 958.080286s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: hyper::proto::h1::io: parsed 4 headers [ 958.080297s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56070}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51670 keepalive=None [ 958.080367s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56070}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 958.080341s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: hyper::proto::h1::conn: incoming body is empty [ 958.080386s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47332 [ 958.080398s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56072}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51672 keepalive=None [ 958.080404s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56072}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 958.080449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: hyper::proto::h1::io: flushed 106 bytes [ 958.080471s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 958.080491s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47332}: linkerd_app_core::serve: Connection closed [ 958.082692s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56072}: linkerd_app_core::serve: Connection closed [ 958.082735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56070}: linkerd_app_core::serve: Connection closed [ 958.674685s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(191), flags: (0x5: END_HEADERS | END_STREAM) } [ 958.674747s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 958.675856s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(191), flags: (0x4: END_HEADERS) } [ 958.675884s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(191), flags: (0x1: END_STREAM) } [ 960.362800s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 960.362866s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 960.362877s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 963.079169s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56132}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 963.079210s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56132}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56132 [ 963.079261s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56134}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 963.079272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56134}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56134 [ 963.079307s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56132}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 963.079418s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56134}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 963.079520s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56132}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51732 keepalive=None [ 963.079537s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56132}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 963.079564s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56134}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51734 keepalive=None [ 963.079570s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56134}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 963.081942s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56132}: linkerd_app_core::serve: Connection closed [ 963.082001s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56134}: linkerd_app_core::serve: Connection closed [ 968.079063s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56212}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 968.079105s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 968.079114s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56212}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56212 [ 968.079158s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.093µs [ 968.079166s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 968.079174s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 968.079177s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56218}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 968.079198s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56218}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56218 [ 968.079202s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: hyper::proto::h1::io: parsed 4 headers [ 968.079233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: hyper::proto::h1::conn: incoming body is empty [ 968.079240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56212}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 968.079246s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47474 [ 968.079319s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: hyper::proto::h1::io: flushed 106 bytes [ 968.079330s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56218}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 968.079351s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 968.079370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47474}: linkerd_app_core::serve: Connection closed [ 968.079386s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 968.079399s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.729µs [ 968.079404s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 968.079403s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56212}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51814 keepalive=None [ 968.079410s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 968.079412s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56212}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 968.079429s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: hyper::proto::h1::io: parsed 4 headers [ 968.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56218}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51816 keepalive=None [ 968.079479s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56218}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 968.079443s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: hyper::proto::h1::conn: incoming body is empty [ 968.079515s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47478 [ 968.079611s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: hyper::proto::h1::io: flushed 107 bytes [ 968.079647s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 968.079666s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47478}: linkerd_app_core::serve: Connection closed [ 968.082000s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56218}: linkerd_app_core::serve: Connection closed [ 968.082325s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56212}: linkerd_app_core::serve: Connection closed [ 968.675230s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(193), flags: (0x5: END_HEADERS | END_STREAM) } [ 968.675293s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 968.676187s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(193), flags: (0x4: END_HEADERS) } [ 968.676215s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(193), flags: (0x1: END_STREAM) } [ 970.338246s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 970.338332s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 970.338347s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 973.079480s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56290}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 973.079526s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56290}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56290 [ 973.079563s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56292}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 973.079575s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56292}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56292 [ 973.079596s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56290}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 973.079664s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56292}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 973.079716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56290}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51888 keepalive=None [ 973.079730s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56290}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 973.079750s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56292}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51890 keepalive=None [ 973.079758s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56292}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 973.082572s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56292}: linkerd_app_core::serve: Connection closed [ 973.082968s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56290}: linkerd_app_core::serve: Connection closed [ 978.079356s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56352}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 978.079409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 978.079405s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56352}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56352 [ 978.079431s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.145µs [ 978.079440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 978.079448s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 978.079448s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56360}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 978.079460s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56360}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56360 [ 978.079479s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: hyper::proto::h1::io: parsed 4 headers [ 978.079483s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: hyper::proto::h1::conn: incoming body is empty [ 978.079486s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56352}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 978.079494s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47616 [ 978.079569s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56360}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 978.079573s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: hyper::proto::h1::io: flushed 106 bytes [ 978.079624s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 978.079646s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56352}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51956 keepalive=None [ 978.079654s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56352}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 978.079655s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47616}: linkerd_app_core::serve: Connection closed [ 978.079664s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 978.079675s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56360}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:51958 keepalive=None [ 978.079694s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56360}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 978.079674s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.927µs [ 978.079703s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 978.079710s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 978.079735s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: hyper::proto::h1::io: parsed 4 headers [ 978.079738s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: hyper::proto::h1::conn: incoming body is empty [ 978.079744s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47614 [ 978.079804s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: hyper::proto::h1::io: flushed 107 bytes [ 978.079816s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 978.079830s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47614}: linkerd_app_core::serve: Connection closed [ 978.081955s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56360}: linkerd_app_core::serve: Connection closed [ 978.082026s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56352}: linkerd_app_core::serve: Connection closed [ 978.674702s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(195), flags: (0x5: END_HEADERS | END_STREAM) } [ 978.674759s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 978.675830s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(195), flags: (0x4: END_HEADERS) } [ 978.675862s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(195), flags: (0x1: END_STREAM) } [ 980.344384s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 980.344452s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 980.344462s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 983.078949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56424}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 983.078996s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56424}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56424 [ 983.079032s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56422}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 983.079044s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56422}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56422 [ 983.079067s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56424}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 983.079149s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 983.079217s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56424}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52022 keepalive=None [ 983.079224s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56424}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 983.079259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52024 keepalive=None [ 983.079264s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56422}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 983.081810s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56422}: linkerd_app_core::serve: Connection closed [ 983.081849s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56424}: linkerd_app_core::serve: Connection closed [ 988.079777s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56494}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 988.079825s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56494}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56494 [ 988.079830s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 988.079853s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.863µs [ 988.079867s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 988.079863s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56502}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 988.079873s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 988.079874s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56502}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56502 [ 988.079898s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: hyper::proto::h1::io: parsed 4 headers [ 988.079905s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: hyper::proto::h1::conn: incoming body is empty [ 988.079908s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56494}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 988.079914s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47756 [ 988.079974s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: hyper::proto::h1::io: flushed 107 bytes [ 988.079992s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56502}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 988.079998s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 988.080016s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47756}: linkerd_app_core::serve: Connection closed [ 988.080024s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 988.080032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=2.976µs [ 988.080036s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 988.080041s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 988.080054s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: hyper::proto::h1::io: parsed 4 headers [ 988.080057s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: hyper::proto::h1::conn: incoming body is empty [ 988.080058s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56494}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52098 keepalive=None [ 988.080064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47758 [ 988.080069s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56494}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 988.080091s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56502}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52100 keepalive=None [ 988.080095s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56502}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 988.080117s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: hyper::proto::h1::io: flushed 106 bytes [ 988.080135s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 988.080146s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47758}: linkerd_app_core::serve: Connection closed [ 988.082522s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56502}: linkerd_app_core::serve: Connection closed [ 988.082580s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56494}: linkerd_app_core::serve: Connection closed [ 988.675360s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(197), flags: (0x5: END_HEADERS | END_STREAM) } [ 988.675418s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 988.676381s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(197), flags: (0x4: END_HEADERS) } [ 988.676409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(197), flags: (0x1: END_STREAM) } [ 993.079046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56558}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 993.079085s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56558}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56558 [ 993.079152s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56560}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 993.079175s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56560}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56560 [ 993.079212s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 993.079312s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56560}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 993.079366s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52158 keepalive=None [ 993.079371s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56558}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 993.079393s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56560}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52160 keepalive=None [ 993.079399s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56560}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 993.081850s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56558}: linkerd_app_core::serve: Connection closed [ 993.081890s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56560}: linkerd_app_core::serve: Connection closed [ 998.079596s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56634}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 998.079630s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 998.079652s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56634}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56634 [ 998.079676s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.625µs [ 998.079690s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 998.079689s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56636}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 998.079716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56636}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56636 [ 998.079719s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 998.079753s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56634}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 998.079760s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: hyper::proto::h1::io: parsed 4 headers [ 998.079764s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: hyper::proto::h1::conn: incoming body is empty [ 998.079774s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47904 [ 998.079839s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56636}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 998.079863s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: hyper::proto::h1::io: flushed 106 bytes [ 998.079882s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 998.079906s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47904}: linkerd_app_core::serve: Connection closed [ 998.079904s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56634}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52238 keepalive=None [ 998.079944s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56634}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 998.079966s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 998.079971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56636}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52240 keepalive=None [ 998.079998s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56636}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 998.080003s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.067µs [ 998.080014s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 998.080019s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 998.080038s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: hyper::proto::h1::io: parsed 4 headers [ 998.080045s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: hyper::proto::h1::conn: incoming body is empty [ 998.080052s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:47896 [ 998.080107s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: hyper::proto::h1::io: flushed 107 bytes [ 998.080133s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 998.080149s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:47896}: linkerd_app_core::serve: Connection closed [ 998.082438s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56634}: linkerd_app_core::serve: Connection closed [ 998.082489s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56636}: linkerd_app_core::serve: Connection closed [ 998.674553s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(199), flags: (0x5: END_HEADERS | END_STREAM) } [ 998.674623s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 998.675576s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(199), flags: (0x4: END_HEADERS) } [ 998.675612s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(199), flags: (0x1: END_STREAM) } [ 1003.079178s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56702}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1003.079223s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56702}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56702 [ 1003.079270s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56704}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1003.079280s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56704}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56704 [ 1003.079307s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56702}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1003.079389s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56704}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1003.079459s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56702}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52302 keepalive=None [ 1003.079470s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56702}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1003.079496s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56704}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52304 keepalive=None [ 1003.079501s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56704}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1003.081977s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56702}: linkerd_app_core::serve: Connection closed [ 1003.082043s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56704}: linkerd_app_core::serve: Connection closed [ 1008.079075s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56776}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1008.079123s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56776}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56776 [ 1008.079152s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1008.079179s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.265µs [ 1008.079190s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1008.079197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1008.079194s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56778}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1008.079209s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56778}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56778 [ 1008.079223s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: hyper::proto::h1::io: parsed 4 headers [ 1008.079232s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: hyper::proto::h1::conn: incoming body is empty [ 1008.079240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56776}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1008.079242s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48044 [ 1008.079308s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: hyper::proto::h1::io: flushed 106 bytes [ 1008.079327s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56778}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1008.079332s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1008.079355s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48044}: linkerd_app_core::serve: Connection closed [ 1008.079370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1008.079380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.86µs [ 1008.079388s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1008.079393s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1008.079427s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: hyper::proto::h1::io: parsed 4 headers [ 1008.079433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: hyper::proto::h1::conn: incoming body is empty [ 1008.079392s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56776}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52380 keepalive=None [ 1008.079439s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48046 [ 1008.079445s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56776}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1008.079490s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56778}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52382 keepalive=None [ 1008.079518s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56778}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1008.079497s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: hyper::proto::h1::io: flushed 107 bytes [ 1008.079555s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1008.079570s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48046}: linkerd_app_core::serve: Connection closed [ 1008.082066s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56778}: linkerd_app_core::serve: Connection closed [ 1008.082124s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56776}: linkerd_app_core::serve: Connection closed [ 1008.675370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(201), flags: (0x5: END_HEADERS | END_STREAM) } [ 1008.675428s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1008.676294s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(201), flags: (0x4: END_HEADERS) } [ 1008.676322s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(201), flags: (0x1: END_STREAM) } [ 1013.079806s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56842}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1013.079847s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56842}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56842 [ 1013.079900s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56844}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1013.079923s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56844}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56844 [ 1013.079950s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56842}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1013.080039s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56844}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1013.080104s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56842}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52442 keepalive=None [ 1013.080112s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56842}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1013.080131s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56844}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52444 keepalive=None [ 1013.080134s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56844}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1013.082702s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56842}: linkerd_app_core::serve: Connection closed [ 1013.082754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56844}: linkerd_app_core::serve: Connection closed [ 1018.079890s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56918}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1018.079926s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1018.079953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56918}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56918 [ 1018.079980s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.849µs [ 1018.079994s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1018.079992s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56916}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1018.080016s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1018.080031s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56916}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56916 [ 1018.080076s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56918}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1018.080076s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: hyper::proto::h1::io: parsed 4 headers [ 1018.080100s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: hyper::proto::h1::conn: incoming body is empty [ 1018.080121s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48176 [ 1018.080176s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56916}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1018.080229s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: hyper::proto::h1::io: flushed 107 bytes [ 1018.080256s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1018.080302s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48176}: linkerd_app_core::serve: Connection closed [ 1018.080258s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56918}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52518 keepalive=None [ 1018.080315s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56918}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1018.080326s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1018.080338s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.528µs [ 1018.080353s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1018.080360s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1018.080366s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56916}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52520 keepalive=None [ 1018.080374s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56916}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1018.080380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: hyper::proto::h1::io: parsed 4 headers [ 1018.080393s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: hyper::proto::h1::conn: incoming body is empty [ 1018.080401s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48184 [ 1018.080488s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: hyper::proto::h1::io: flushed 106 bytes [ 1018.080514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1018.080535s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48184}: linkerd_app_core::serve: Connection closed [ 1018.082777s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56916}: linkerd_app_core::serve: Connection closed [ 1018.082840s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56918}: linkerd_app_core::serve: Connection closed [ 1018.675296s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(203), flags: (0x5: END_HEADERS | END_STREAM) } [ 1018.675351s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1018.676236s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(203), flags: (0x4: END_HEADERS) } [ 1018.676262s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(203), flags: (0x1: END_STREAM) } [ 1023.079830s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56994}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1023.079871s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56994}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56994 [ 1023.079920s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56996}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1023.079937s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56996}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:56996 [ 1023.079968s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1023.080071s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56996}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1023.080137s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52594 keepalive=None [ 1023.080146s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56994}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1023.080175s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56996}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52596 keepalive=None [ 1023.080181s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56996}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1023.082635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56994}: linkerd_app_core::serve: Connection closed [ 1023.082679s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:56996}: linkerd_app_core::serve: Connection closed [ 1028.079769s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57070}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1028.079823s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57070}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57070 [ 1028.079861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1028.079893s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.987µs [ 1028.079911s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1028.079890s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57072}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1028.079942s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57072}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57072 [ 1028.079927s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1028.079975s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57070}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1028.080018s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: hyper::proto::h1::io: parsed 4 headers [ 1028.080032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: hyper::proto::h1::conn: incoming body is empty [ 1028.080049s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48332 [ 1028.080085s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57072}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1028.080151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57070}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52674 keepalive=None [ 1028.080158s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57070}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1028.080167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: hyper::proto::h1::io: flushed 107 bytes [ 1028.080181s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57072}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52676 keepalive=None [ 1028.080185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57072}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1028.080194s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1028.080223s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48332}: linkerd_app_core::serve: Connection closed [ 1028.080237s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1028.080251s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.32µs [ 1028.080257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1028.080279s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1028.080294s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: hyper::proto::h1::io: parsed 4 headers [ 1028.080297s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: hyper::proto::h1::conn: incoming body is empty [ 1028.080302s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48334 [ 1028.080373s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: hyper::proto::h1::io: flushed 106 bytes [ 1028.080409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1028.080435s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48334}: linkerd_app_core::serve: Connection closed [ 1028.082662s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57070}: linkerd_app_core::serve: Connection closed [ 1028.082733s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57072}: linkerd_app_core::serve: Connection closed [ 1028.675374s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(205), flags: (0x5: END_HEADERS | END_STREAM) } [ 1028.675430s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1028.676413s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(205), flags: (0x4: END_HEADERS) } [ 1028.676443s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(205), flags: (0x1: END_STREAM) } [ 1030.346385s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1030.346450s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1030.346461s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1033.079788s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57142}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1033.079825s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57142}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57142 [ 1033.079859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57144}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1033.079866s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57144}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57144 [ 1033.079891s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57142}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1033.079969s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57144}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1033.080046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57142}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52742 keepalive=None [ 1033.080062s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57142}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1033.080090s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57144}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52744 keepalive=None [ 1033.080097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57144}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1033.082553s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57142}: linkerd_app_core::serve: Connection closed [ 1033.082605s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57144}: linkerd_app_core::serve: Connection closed [ 1038.079095s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1038.079074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57216}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1038.079145s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.237µs [ 1038.079154s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1038.079149s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57216}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57216 [ 1038.079162s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1038.079191s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: hyper::proto::h1::io: parsed 4 headers [ 1038.079195s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: hyper::proto::h1::conn: incoming body is empty [ 1038.079192s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57224}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1038.079209s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57224}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57224 [ 1038.079207s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48478 [ 1038.079234s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57216}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1038.079290s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: hyper::proto::h1::io: flushed 107 bytes [ 1038.079319s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57224}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1038.079323s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1038.079345s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48478}: linkerd_app_core::serve: Connection closed [ 1038.079361s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1038.079370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.339µs [ 1038.079381s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1038.079387s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1038.079388s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57216}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52820 keepalive=None [ 1038.079396s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57216}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1038.079401s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: hyper::proto::h1::io: parsed 4 headers [ 1038.079404s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: hyper::proto::h1::conn: incoming body is empty [ 1038.079409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48480 [ 1038.079419s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57224}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52822 keepalive=None [ 1038.079423s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57224}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1038.079463s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: hyper::proto::h1::io: flushed 106 bytes [ 1038.079486s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1038.079501s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48480}: linkerd_app_core::serve: Connection closed [ 1038.081809s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57224}: linkerd_app_core::serve: Connection closed [ 1038.081857s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57216}: linkerd_app_core::serve: Connection closed [ 1038.675265s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(207), flags: (0x5: END_HEADERS | END_STREAM) } [ 1038.675321s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1038.676474s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(207), flags: (0x4: END_HEADERS) } [ 1038.676500s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(207), flags: (0x1: END_STREAM) } [ 1040.345837s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1040.345907s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1040.345918s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1043.079926s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57284}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1043.079958s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57284}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57284 [ 1043.079989s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57286}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1043.079996s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57286}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57286 [ 1043.080018s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57284}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1043.080095s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57286}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1043.080142s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57284}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52884 keepalive=None [ 1043.080155s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57284}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1043.080173s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57286}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52886 keepalive=None [ 1043.080178s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57286}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1043.082647s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57284}: linkerd_app_core::serve: Connection closed [ 1043.082753s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57286}: linkerd_app_core::serve: Connection closed [ 1048.079203s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57354}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1048.079240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57354}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57354 [ 1048.079242s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1048.079274s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.886µs [ 1048.079285s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1048.079287s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57358}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1048.079303s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1048.079301s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57358}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57358 [ 1048.079335s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57354}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1048.079337s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: hyper::proto::h1::io: parsed 4 headers [ 1048.079367s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: hyper::proto::h1::conn: incoming body is empty [ 1048.079381s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48616 [ 1048.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57358}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1048.079469s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: hyper::proto::h1::io: flushed 106 bytes [ 1048.079491s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1048.079502s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57354}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52956 keepalive=None [ 1048.079522s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57354}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1048.079509s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48616}: linkerd_app_core::serve: Connection closed [ 1048.079547s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57358}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:52958 keepalive=None [ 1048.079550s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1048.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57358}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1048.079579s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.308µs [ 1048.079585s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1048.079596s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1048.079612s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: hyper::proto::h1::io: parsed 4 headers [ 1048.079620s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: hyper::proto::h1::conn: incoming body is empty [ 1048.079627s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48620 [ 1048.079707s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: hyper::proto::h1::io: flushed 107 bytes [ 1048.079736s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1048.079764s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48620}: linkerd_app_core::serve: Connection closed [ 1048.081920s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57354}: linkerd_app_core::serve: Connection closed [ 1048.081962s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57358}: linkerd_app_core::serve: Connection closed [ 1048.675348s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(209), flags: (0x5: END_HEADERS | END_STREAM) } [ 1048.675408s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1048.676447s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(209), flags: (0x4: END_HEADERS) } [ 1048.676477s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(209), flags: (0x1: END_STREAM) } [ 1053.079202s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57422}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1053.079254s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57422}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57422 [ 1053.079306s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57424}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1053.079328s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57424}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57424 [ 1053.079359s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1053.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57424}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1053.079544s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53022 keepalive=None [ 1053.079554s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57422}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1053.079575s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57424}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53024 keepalive=None [ 1053.079580s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57424}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1053.081819s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57424}: linkerd_app_core::serve: Connection closed [ 1053.081875s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57422}: linkerd_app_core::serve: Connection closed [ 1058.079635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57500}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1058.079677s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1058.079685s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57500}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57500 [ 1058.079705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.264µs [ 1058.079712s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1058.079726s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1058.079729s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57504}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1058.079738s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57504}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57504 [ 1058.079752s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: hyper::proto::h1::io: parsed 4 headers [ 1058.079760s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57500}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1058.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: hyper::proto::h1::conn: incoming body is empty [ 1058.079772s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48762 [ 1058.079838s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57504}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1058.079843s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: hyper::proto::h1::io: flushed 107 bytes [ 1058.079883s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1058.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48762}: linkerd_app_core::serve: Connection closed [ 1058.079922s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57500}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53100 keepalive=None [ 1058.079931s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1058.079932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57500}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1058.079943s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.16µs [ 1058.079958s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1058.079958s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57504}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53102 keepalive=None [ 1058.079963s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1058.079963s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57504}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1058.079982s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: hyper::proto::h1::io: parsed 4 headers [ 1058.079996s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: hyper::proto::h1::conn: incoming body is empty [ 1058.080001s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48766 [ 1058.080066s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: hyper::proto::h1::io: flushed 106 bytes [ 1058.080094s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1058.080121s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48766}: linkerd_app_core::serve: Connection closed [ 1058.082429s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57500}: linkerd_app_core::serve: Connection closed [ 1058.082467s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57504}: linkerd_app_core::serve: Connection closed [ 1058.675279s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(211), flags: (0x5: END_HEADERS | END_STREAM) } [ 1058.675337s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1058.676241s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(211), flags: (0x4: END_HEADERS) } [ 1058.676266s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(211), flags: (0x1: END_STREAM) } [ 1063.079679s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57556}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1063.079723s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57556}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57556 [ 1063.079765s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57558}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1063.079782s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57558}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57558 [ 1063.079813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57556}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1063.079897s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1063.079945s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57556}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53156 keepalive=None [ 1063.079951s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57556}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1063.079973s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53158 keepalive=None [ 1063.079977s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57558}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1063.082543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57556}: linkerd_app_core::serve: Connection closed [ 1063.082598s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57558}: linkerd_app_core::serve: Connection closed [ 1068.079409s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57628}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1068.079451s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1068.079477s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57628}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57628 [ 1068.079508s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.194µs [ 1068.079533s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1068.079544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1068.079571s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: hyper::proto::h1::io: parsed 4 headers [ 1068.079576s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: hyper::proto::h1::conn: incoming body is empty [ 1068.079567s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57636}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1068.079583s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57636}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57636 [ 1068.079586s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48890 [ 1068.079632s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57628}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1068.079680s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: hyper::proto::h1::io: flushed 107 bytes [ 1068.079708s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1068.079739s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48890}: linkerd_app_core::serve: Connection closed [ 1068.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57636}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1068.079751s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1068.079763s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.599µs [ 1068.079773s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1068.079778s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1068.079795s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: hyper::proto::h1::io: parsed 4 headers [ 1068.079799s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: hyper::proto::h1::conn: incoming body is empty [ 1068.079817s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:48892 [ 1068.079828s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57628}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53232 keepalive=None [ 1068.079838s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57628}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1068.079864s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57636}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53234 keepalive=None [ 1068.079871s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57636}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1068.079878s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: hyper::proto::h1::io: flushed 106 bytes [ 1068.079908s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1068.079931s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:48892}: linkerd_app_core::serve: Connection closed [ 1068.082230s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57628}: linkerd_app_core::serve: Connection closed [ 1068.082281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57636}: linkerd_app_core::serve: Connection closed [ 1068.674452s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(213), flags: (0x5: END_HEADERS | END_STREAM) } [ 1068.674523s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1068.675539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(213), flags: (0x4: END_HEADERS) } [ 1068.675574s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(213), flags: (0x1: END_STREAM) } [ 1070.341117s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1070.341180s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1070.341188s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1073.078943s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57696}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1073.078984s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57696}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57696 [ 1073.079025s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57698}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1073.079038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57698}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57698 [ 1073.079110s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57696}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1073.079228s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57698}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1073.079301s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57696}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53294 keepalive=None [ 1073.079329s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57696}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1073.079353s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57698}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53296 keepalive=None [ 1073.079363s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57698}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1073.081813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57696}: linkerd_app_core::serve: Connection closed [ 1073.081905s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57698}: linkerd_app_core::serve: Connection closed [ 1078.079386s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57768}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1078.079412s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1078.079442s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57768}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57768 [ 1078.079468s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.766µs [ 1078.079484s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1078.079482s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57766}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1078.079524s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57766}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57766 [ 1078.079507s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1078.079558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57768}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1078.079575s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: hyper::proto::h1::io: parsed 4 headers [ 1078.079580s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: hyper::proto::h1::conn: incoming body is empty [ 1078.079593s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49034 [ 1078.079656s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57766}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1078.079686s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: hyper::proto::h1::io: flushed 106 bytes [ 1078.079714s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1078.079725s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57768}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53370 keepalive=None [ 1078.079732s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57768}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1078.079734s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49034}: linkerd_app_core::serve: Connection closed [ 1078.079747s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1078.079750s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57766}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53372 keepalive=None [ 1078.079753s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57766}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1078.079757s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.948µs [ 1078.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1078.079768s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1078.079783s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: hyper::proto::h1::io: parsed 4 headers [ 1078.079785s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: hyper::proto::h1::conn: incoming body is empty [ 1078.079790s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49036 [ 1078.079834s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: hyper::proto::h1::io: flushed 107 bytes [ 1078.079851s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1078.079870s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49036}: linkerd_app_core::serve: Connection closed [ 1078.082102s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57768}: linkerd_app_core::serve: Connection closed [ 1078.082172s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57766}: linkerd_app_core::serve: Connection closed [ 1078.675371s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(215), flags: (0x5: END_HEADERS | END_STREAM) } [ 1078.675425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1078.676354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(215), flags: (0x4: END_HEADERS) } [ 1078.676382s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(215), flags: (0x1: END_STREAM) } [ 1080.341096s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1080.341163s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1080.341174s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1083.079637s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57842}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1083.079694s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57842}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57842 [ 1083.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57840}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1083.079755s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57840}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57840 [ 1083.079785s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57842}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1083.079880s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1083.079954s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57842}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53440 keepalive=None [ 1083.079963s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57842}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1083.079988s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53442 keepalive=None [ 1083.079992s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57840}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1083.082577s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57840}: linkerd_app_core::serve: Connection closed [ 1083.082631s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57842}: linkerd_app_core::serve: Connection closed [ 1088.078975s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57924}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1088.079030s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57924}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57924 [ 1088.079083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57926}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1088.079099s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57926}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57926 [ 1088.079153s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57924}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1088.079246s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57926}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1088.079348s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57924}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53526 keepalive=None [ 1088.079359s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57924}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1088.079386s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57926}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53528 keepalive=None [ 1088.079392s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57926}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1088.079427s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1088.079451s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.362µs [ 1088.079457s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1088.079463s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1088.079494s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: hyper::proto::h1::io: parsed 4 headers [ 1088.079499s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: hyper::proto::h1::conn: incoming body is empty [ 1088.079513s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49190 [ 1088.079591s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: hyper::proto::h1::io: flushed 106 bytes [ 1088.079621s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1088.079647s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49190}: linkerd_app_core::serve: Connection closed [ 1088.079666s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1088.079686s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.548µs [ 1088.079692s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1088.079696s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1088.079711s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: hyper::proto::h1::io: parsed 4 headers [ 1088.079719s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: hyper::proto::h1::conn: incoming body is empty [ 1088.079724s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49192 [ 1088.079775s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: hyper::proto::h1::io: flushed 107 bytes [ 1088.079793s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1088.079805s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49192}: linkerd_app_core::serve: Connection closed [ 1088.081736s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57926}: linkerd_app_core::serve: Connection closed [ 1088.081784s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57924}: linkerd_app_core::serve: Connection closed [ 1088.674555s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(217), flags: (0x5: END_HEADERS | END_STREAM) } [ 1088.674611s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1088.675482s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(217), flags: (0x4: END_HEADERS) } [ 1088.675515s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(217), flags: (0x1: END_STREAM) } [ 1090.344298s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1090.344357s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1090.344367s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1093.079390s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57996}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1093.079431s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57996}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57996 [ 1093.079469s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57994}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1093.079480s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57994}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:57994 [ 1093.079507s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57996}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1093.079592s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1093.079664s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57996}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53594 keepalive=None [ 1093.079681s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57996}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1093.079711s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53596 keepalive=None [ 1093.079716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57994}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1093.082037s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57996}: linkerd_app_core::serve: Connection closed [ 1093.082104s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:57994}: linkerd_app_core::serve: Connection closed [ 1098.079374s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58070}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1098.079418s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1098.079421s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58070}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58070 [ 1098.079441s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.428µs [ 1098.079451s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1098.079460s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1098.079470s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58068}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1098.079496s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: hyper::proto::h1::io: parsed 4 headers [ 1098.079494s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58068}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58068 [ 1098.079500s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: hyper::proto::h1::conn: incoming body is empty [ 1098.079514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49336 [ 1098.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58070}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1098.079610s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: hyper::proto::h1::io: flushed 107 bytes [ 1098.079633s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58068}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1098.079648s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1098.079674s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49336}: linkerd_app_core::serve: Connection closed [ 1098.079688s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1098.079705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.412µs [ 1098.079721s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1098.079719s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58070}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53674 keepalive=None [ 1098.079728s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1098.079728s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58070}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1098.079748s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: hyper::proto::h1::io: parsed 4 headers [ 1098.079753s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: hyper::proto::h1::conn: incoming body is empty [ 1098.079756s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58068}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53676 keepalive=None [ 1098.079762s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58068}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1098.079763s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49338 [ 1098.079837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: hyper::proto::h1::io: flushed 106 bytes [ 1098.079858s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1098.079874s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49338}: linkerd_app_core::serve: Connection closed [ 1098.082264s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58068}: linkerd_app_core::serve: Connection closed [ 1098.082302s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58070}: linkerd_app_core::serve: Connection closed [ 1098.674837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(219), flags: (0x5: END_HEADERS | END_STREAM) } [ 1098.674896s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1098.675822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(219), flags: (0x4: END_HEADERS) } [ 1098.675849s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(219), flags: (0x1: END_STREAM) } [ 1100.352070s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1100.352135s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1100.352146s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1103.079398s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58142}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1103.079431s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58142}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58142 [ 1103.079475s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58144}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1103.079491s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58144}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58144 [ 1103.079523s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58142}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1103.079618s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58144}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1103.079715s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58142}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53742 keepalive=None [ 1103.079726s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58142}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1103.079752s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58144}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53744 keepalive=None [ 1103.079757s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58144}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1103.082109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58144}: linkerd_app_core::serve: Connection closed [ 1103.082164s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58142}: linkerd_app_core::serve: Connection closed [ 1108.079796s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58218}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1108.079832s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1108.079853s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58218}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58218 [ 1108.079869s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.782µs [ 1108.079877s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1108.079883s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1108.079894s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58220}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1108.079909s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58220}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58220 [ 1108.079920s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: hyper::proto::h1::io: parsed 4 headers [ 1108.079927s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: hyper::proto::h1::conn: incoming body is empty [ 1108.079932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58218}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1108.079937s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49480 [ 1108.079997s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: hyper::proto::h1::io: flushed 107 bytes [ 1108.080017s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58220}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1108.080021s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1108.080067s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49480}: linkerd_app_core::serve: Connection closed [ 1108.080077s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1108.080087s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.366µs [ 1108.080091s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1108.080096s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1108.080109s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: hyper::proto::h1::io: parsed 4 headers [ 1108.080112s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: hyper::proto::h1::conn: incoming body is empty [ 1108.080117s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49486 [ 1108.080121s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58218}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53820 keepalive=None [ 1108.080190s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58218}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1108.080208s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: hyper::proto::h1::io: flushed 106 bytes [ 1108.080217s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58220}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53822 keepalive=None [ 1108.080240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58220}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1108.080241s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1108.080284s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49486}: linkerd_app_core::serve: Connection closed [ 1108.082420s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58220}: linkerd_app_core::serve: Connection closed [ 1108.082463s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58218}: linkerd_app_core::serve: Connection closed [ 1108.674616s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(221), flags: (0x5: END_HEADERS | END_STREAM) } [ 1108.674672s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1108.675750s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(221), flags: (0x4: END_HEADERS) } [ 1108.675778s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(221), flags: (0x1: END_STREAM) } [ 1110.340630s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1110.340692s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1110.340700s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1113.079102s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58288}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1113.079168s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58288}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58288 [ 1113.079213s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58286}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1113.079234s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58286}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58286 [ 1113.079277s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58288}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1113.079389s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58286}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1113.079476s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58288}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53886 keepalive=None [ 1113.079493s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58288}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1113.079521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58286}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53888 keepalive=None [ 1113.079525s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58286}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1113.084177s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58288}: linkerd_app_core::serve: Connection closed [ 1113.084225s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58286}: linkerd_app_core::serve: Connection closed [ 1118.079398s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58366}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1118.079438s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1118.079459s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58366}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58366 [ 1118.079481s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.552µs [ 1118.079488s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1118.079501s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1118.079507s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58364}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1118.079526s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: hyper::proto::h1::io: parsed 4 headers [ 1118.079524s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58364}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58364 [ 1118.079529s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: hyper::proto::h1::conn: incoming body is empty [ 1118.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49626 [ 1118.079555s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58366}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1118.079625s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: hyper::proto::h1::io: flushed 107 bytes [ 1118.079655s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58364}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1118.079668s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1118.079701s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49626}: linkerd_app_core::serve: Connection closed [ 1118.079713s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1118.079724s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.989µs [ 1118.079731s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58366}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53970 keepalive=None [ 1118.079736s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1118.079739s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58366}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1118.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1118.079761s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: hyper::proto::h1::io: parsed 4 headers [ 1118.079768s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: hyper::proto::h1::conn: incoming body is empty [ 1118.079775s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49628 [ 1118.079782s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58364}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:53972 keepalive=None [ 1118.079830s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58364}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1118.079856s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: hyper::proto::h1::io: flushed 106 bytes [ 1118.079872s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1118.079882s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49628}: linkerd_app_core::serve: Connection closed [ 1118.082332s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58364}: linkerd_app_core::serve: Connection closed [ 1118.082533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58366}: linkerd_app_core::serve: Connection closed [ 1118.675315s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(223), flags: (0x5: END_HEADERS | END_STREAM) } [ 1118.675365s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1118.676269s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(223), flags: (0x4: END_HEADERS) } [ 1118.676306s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(223), flags: (0x1: END_STREAM) } [ 1120.340711s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1120.340774s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1120.340792s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1123.079799s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58434}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1123.079832s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58434}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58434 [ 1123.079873s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58432}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1123.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58432}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58432 [ 1123.079912s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58434}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1123.079997s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58432}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1123.080061s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58434}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54032 keepalive=None [ 1123.080071s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58434}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1123.080090s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58432}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54034 keepalive=None [ 1123.080094s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58432}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1123.082337s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58434}: linkerd_app_core::serve: Connection closed [ 1123.082758s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58432}: linkerd_app_core::serve: Connection closed [ 1128.078913s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58514}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1128.078953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58514}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58514 [ 1128.078997s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58516}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1128.079012s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58516}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58516 [ 1128.079043s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58514}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1128.079140s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58516}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1128.079211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58514}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54116 keepalive=None [ 1128.079224s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58514}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1128.079245s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58516}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54118 keepalive=None [ 1128.079250s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58516}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1128.079283s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1128.079312s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.075µs [ 1128.079323s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1128.079332s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1128.079369s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: hyper::proto::h1::io: parsed 4 headers [ 1128.079379s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: hyper::proto::h1::conn: incoming body is empty [ 1128.079390s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49780 [ 1128.079471s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: hyper::proto::h1::io: flushed 107 bytes [ 1128.079500s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1128.079522s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49780}: linkerd_app_core::serve: Connection closed [ 1128.079536s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1128.079553s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.859µs [ 1128.079559s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1128.079563s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1128.079579s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: hyper::proto::h1::io: parsed 4 headers [ 1128.079586s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: hyper::proto::h1::conn: incoming body is empty [ 1128.079592s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49782 [ 1128.079649s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: hyper::proto::h1::io: flushed 106 bytes [ 1128.079671s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1128.079683s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49782}: linkerd_app_core::serve: Connection closed [ 1128.081556s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58514}: linkerd_app_core::serve: Connection closed [ 1128.081983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58516}: linkerd_app_core::serve: Connection closed [ 1128.675483s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(225), flags: (0x5: END_HEADERS | END_STREAM) } [ 1128.675543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1128.676443s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(225), flags: (0x4: END_HEADERS) } [ 1128.676472s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(225), flags: (0x1: END_STREAM) } [ 1133.078887s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58580}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1133.078928s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58580}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58580 [ 1133.078972s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58582}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1133.078989s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58582}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58582 [ 1133.079025s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58580}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1133.079111s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1133.079219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58580}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54178 keepalive=None [ 1133.079228s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58580}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1133.079246s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54180 keepalive=None [ 1133.079251s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58582}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1133.081487s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58580}: linkerd_app_core::serve: Connection closed [ 1133.081544s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58582}: linkerd_app_core::serve: Connection closed [ 1138.079210s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58656}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1138.079235s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1138.079259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58656}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58656 [ 1138.079278s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.533µs [ 1138.079285s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1138.079291s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1138.079295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58658}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1138.079308s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58658}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58658 [ 1138.079316s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: hyper::proto::h1::io: parsed 4 headers [ 1138.079334s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: hyper::proto::h1::conn: incoming body is empty [ 1138.079347s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58656}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1138.079344s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49926 [ 1138.079427s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58658}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1138.079429s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: hyper::proto::h1::io: flushed 107 bytes [ 1138.079455s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1138.079479s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49926}: linkerd_app_core::serve: Connection closed [ 1138.079492s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1138.079498s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58656}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54260 keepalive=None [ 1138.079504s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.819µs [ 1138.079507s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58656}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1138.079509s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1138.079515s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1138.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58658}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54262 keepalive=None [ 1138.079554s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58658}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1138.079533s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: hyper::proto::h1::io: parsed 4 headers [ 1138.079562s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: hyper::proto::h1::conn: incoming body is empty [ 1138.079569s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:49918 [ 1138.079637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: hyper::proto::h1::io: flushed 106 bytes [ 1138.079661s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1138.079677s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:49918}: linkerd_app_core::serve: Connection closed [ 1138.081788s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58656}: linkerd_app_core::serve: Connection closed [ 1138.081841s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58658}: linkerd_app_core::serve: Connection closed [ 1138.675440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(227), flags: (0x5: END_HEADERS | END_STREAM) } [ 1138.675502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1138.676541s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(227), flags: (0x4: END_HEADERS) } [ 1138.676567s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(227), flags: (0x1: END_STREAM) } [ 1143.079442s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58734}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1143.079498s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58734}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58734 [ 1143.079549s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58736}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1143.079560s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58736}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58736 [ 1143.079588s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58734}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1143.079686s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58736}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1143.079793s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58734}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54334 keepalive=None [ 1143.079814s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58734}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1143.079837s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58736}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54336 keepalive=None [ 1143.079851s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58736}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1143.082111s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58736}: linkerd_app_core::serve: Connection closed [ 1143.082158s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58734}: linkerd_app_core::serve: Connection closed [ 1148.079352s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58820}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1148.079384s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1148.079423s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58820}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58820 [ 1148.079449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.89µs [ 1148.079467s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1148.079474s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1148.079474s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58818}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1148.079495s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58818}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58818 [ 1148.079502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: hyper::proto::h1::io: parsed 4 headers [ 1148.079522s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: hyper::proto::h1::conn: incoming body is empty [ 1148.079533s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50080 [ 1148.079540s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58820}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1148.079611s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: hyper::proto::h1::io: flushed 107 bytes [ 1148.079638s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1148.079652s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58818}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1148.079659s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50080}: linkerd_app_core::serve: Connection closed [ 1148.079678s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1148.079691s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.999µs [ 1148.079696s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1148.079701s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1148.079720s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: hyper::proto::h1::io: parsed 4 headers [ 1148.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: hyper::proto::h1::conn: incoming body is empty [ 1148.079729s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50082 [ 1148.079744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58820}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54424 keepalive=None [ 1148.079776s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58820}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1148.079789s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: hyper::proto::h1::io: flushed 106 bytes [ 1148.079805s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1148.079812s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58818}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54426 keepalive=None [ 1148.079817s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58818}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1148.079824s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50082}: linkerd_app_core::serve: Connection closed [ 1148.082077s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58818}: linkerd_app_core::serve: Connection closed [ 1148.082140s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58820}: linkerd_app_core::serve: Connection closed [ 1148.675160s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(229), flags: (0x5: END_HEADERS | END_STREAM) } [ 1148.675219s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1148.676176s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(229), flags: (0x4: END_HEADERS) } [ 1148.676203s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(229), flags: (0x1: END_STREAM) } [ 1150.337713s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1150.337767s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1150.337775s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1153.079950s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58892}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1153.080001s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58892}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58892 [ 1153.080049s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58894}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1153.080068s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58894}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58894 [ 1153.080111s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58892}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1153.080216s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58894}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1153.080288s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58892}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54490 keepalive=None [ 1153.080304s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58892}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1153.080332s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58894}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54492 keepalive=None [ 1153.080337s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58894}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1153.082595s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58892}: linkerd_app_core::serve: Connection closed [ 1153.082645s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58894}: linkerd_app_core::serve: Connection closed [ 1158.079159s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58962}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1158.079189s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1158.079197s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58962}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58962 [ 1158.079216s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.397µs [ 1158.079226s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1158.079234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1158.079242s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58964}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1158.079257s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58964}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:58964 [ 1158.079263s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: hyper::proto::h1::io: parsed 4 headers [ 1158.079271s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: hyper::proto::h1::conn: incoming body is empty [ 1158.079280s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50230 [ 1158.079290s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58962}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1158.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: hyper::proto::h1::io: flushed 106 bytes [ 1158.079370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1158.079370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58964}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1158.079401s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50230}: linkerd_app_core::serve: Connection closed [ 1158.079415s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1158.079427s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.537µs [ 1158.079432s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1158.079437s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1158.079449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: hyper::proto::h1::io: parsed 4 headers [ 1158.079454s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: hyper::proto::h1::conn: incoming body is empty [ 1158.079460s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50224 [ 1158.079479s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58962}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54564 keepalive=None [ 1158.079490s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58962}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1158.079515s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58964}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54566 keepalive=None [ 1158.079516s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: hyper::proto::h1::io: flushed 107 bytes [ 1158.079520s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58964}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1158.079534s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1158.079551s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50224}: linkerd_app_core::serve: Connection closed [ 1158.081536s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58962}: linkerd_app_core::serve: Connection closed [ 1158.081575s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:58964}: linkerd_app_core::serve: Connection closed [ 1158.674674s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(231), flags: (0x5: END_HEADERS | END_STREAM) } [ 1158.674726s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1158.675837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(231), flags: (0x4: END_HEADERS) } [ 1158.675865s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(231), flags: (0x1: END_STREAM) } [ 1160.348064s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1160.348123s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1160.348131s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1163.079810s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59028}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1163.079862s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59028}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59028 [ 1163.079906s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59030}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1163.079921s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59030}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59030 [ 1163.079957s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59028}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1163.080053s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59030}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1163.080138s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59028}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54628 keepalive=None [ 1163.080148s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59028}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1163.080168s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59030}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54630 keepalive=None [ 1163.080173s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59030}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1163.083552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59030}: linkerd_app_core::serve: Connection closed [ 1163.083604s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59028}: linkerd_app_core::serve: Connection closed [ 1168.079150s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59098}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1168.079195s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1168.079206s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59098}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59098 [ 1168.079224s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.128µs [ 1168.079233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1168.079241s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1168.079254s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59100}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1168.079270s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59100}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59100 [ 1168.079275s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: hyper::proto::h1::io: parsed 4 headers [ 1168.079279s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: hyper::proto::h1::conn: incoming body is empty [ 1168.079295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59098}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1168.079292s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50368 [ 1168.079385s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59100}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1168.079409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: hyper::proto::h1::io: flushed 107 bytes [ 1168.079434s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1168.079453s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59098}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54702 keepalive=None [ 1168.079458s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50368}: linkerd_app_core::serve: Connection closed [ 1168.079464s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59098}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1168.079475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1168.079488s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.709µs [ 1168.079517s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1168.079489s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59100}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54704 keepalive=None [ 1168.079523s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1168.079526s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59100}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1168.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: hyper::proto::h1::io: parsed 4 headers [ 1168.079542s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: hyper::proto::h1::conn: incoming body is empty [ 1168.079549s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50360 [ 1168.079623s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: hyper::proto::h1::io: flushed 106 bytes [ 1168.079649s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1168.079665s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50360}: linkerd_app_core::serve: Connection closed [ 1168.081761s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59098}: linkerd_app_core::serve: Connection closed [ 1168.081813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59100}: linkerd_app_core::serve: Connection closed [ 1168.674800s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(233), flags: (0x5: END_HEADERS | END_STREAM) } [ 1168.674861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1168.675913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(233), flags: (0x4: END_HEADERS) } [ 1168.675942s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(233), flags: (0x1: END_STREAM) } [ 1173.079493s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59168}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1173.079533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59168}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59168 [ 1173.079583s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59166}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1173.079598s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59166}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59166 [ 1173.079636s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59168}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1173.079735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59166}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1173.079804s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59168}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54766 keepalive=None [ 1173.079817s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59168}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1173.079831s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59166}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54768 keepalive=None [ 1173.079834s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59166}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1173.081910s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59168}: linkerd_app_core::serve: Connection closed [ 1173.081963s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59166}: linkerd_app_core::serve: Connection closed [ 1178.079008s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59238}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1178.079060s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59238}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59238 [ 1178.079074s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1178.079103s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.566µs [ 1178.079112s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1178.079118s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1178.079115s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59240}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1178.079150s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59240}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59240 [ 1178.079169s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: hyper::proto::h1::io: parsed 4 headers [ 1178.079178s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: hyper::proto::h1::conn: incoming body is empty [ 1178.079185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59238}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1178.079188s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50500 [ 1178.079263s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: hyper::proto::h1::io: flushed 107 bytes [ 1178.079271s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59240}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1178.079289s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1178.079310s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50500}: linkerd_app_core::serve: Connection closed [ 1178.079333s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1178.079339s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59238}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54838 keepalive=None [ 1178.079379s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59238}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1178.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.169µs [ 1178.079403s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1178.079409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1178.079413s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59240}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54840 keepalive=None [ 1178.079418s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59240}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1178.079424s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: hyper::proto::h1::io: parsed 4 headers [ 1178.079427s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: hyper::proto::h1::conn: incoming body is empty [ 1178.079442s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50504 [ 1178.079503s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: hyper::proto::h1::io: flushed 106 bytes [ 1178.079522s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1178.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50504}: linkerd_app_core::serve: Connection closed [ 1178.081546s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59238}: linkerd_app_core::serve: Connection closed [ 1178.081603s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59240}: linkerd_app_core::serve: Connection closed [ 1178.675363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(235), flags: (0x5: END_HEADERS | END_STREAM) } [ 1178.675425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1178.676320s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(235), flags: (0x4: END_HEADERS) } [ 1178.676354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(235), flags: (0x1: END_STREAM) } [ 1183.079443s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59296}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1183.079488s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59296}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59296 [ 1183.079534s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59298}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1183.079548s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59298}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59298 [ 1183.079581s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59296}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1183.079670s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59298}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1183.079739s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59296}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54896 keepalive=None [ 1183.079755s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59296}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1183.079778s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59298}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54898 keepalive=None [ 1183.079783s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59298}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1183.082348s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59296}: linkerd_app_core::serve: Connection closed [ 1183.082405s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59298}: linkerd_app_core::serve: Connection closed [ 1188.079329s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59370}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1188.079386s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1188.079383s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59370}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59370 [ 1188.079428s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.345µs [ 1188.079438s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1188.079444s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1188.079456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59374}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1188.079479s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: hyper::proto::h1::io: parsed 4 headers [ 1188.079479s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59374}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59374 [ 1188.079485s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: hyper::proto::h1::conn: incoming body is empty [ 1188.079500s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50632 [ 1188.079514s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59370}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1188.079607s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: hyper::proto::h1::io: flushed 106 bytes [ 1188.079642s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1188.079658s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59374}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1188.079663s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50632}: linkerd_app_core::serve: Connection closed [ 1188.079710s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1188.079720s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.837µs [ 1188.079725s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1188.079729s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1188.079742s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: hyper::proto::h1::io: parsed 4 headers [ 1188.079745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: hyper::proto::h1::conn: incoming body is empty [ 1188.079750s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50638 [ 1188.079755s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59370}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54972 keepalive=None [ 1188.079763s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59370}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1188.079780s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59374}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:54974 keepalive=None [ 1188.079783s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59374}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1188.079811s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: hyper::proto::h1::io: flushed 107 bytes [ 1188.079829s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1188.079843s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50638}: linkerd_app_core::serve: Connection closed [ 1188.081768s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59374}: linkerd_app_core::serve: Connection closed [ 1188.081813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59370}: linkerd_app_core::serve: Connection closed [ 1188.675439s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(237), flags: (0x5: END_HEADERS | END_STREAM) } [ 1188.675493s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1188.676516s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(237), flags: (0x4: END_HEADERS) } [ 1188.676544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(237), flags: (0x1: END_STREAM) } [ 1193.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59436}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1193.079777s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59436}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59436 [ 1193.079809s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59434}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1193.079816s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59434}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59434 [ 1193.079842s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59436}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1193.079917s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59434}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1193.079980s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59436}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55034 keepalive=None [ 1193.079994s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59436}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1193.080014s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59434}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55036 keepalive=None [ 1193.080029s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59434}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1193.082394s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59434}: linkerd_app_core::serve: Connection closed [ 1193.083934s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59436}: linkerd_app_core::serve: Connection closed [ 1198.079351s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59508}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1198.079382s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1198.079412s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59508}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59508 [ 1198.079431s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.736µs [ 1198.079439s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1198.079445s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1198.079467s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59510}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1198.079476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: hyper::proto::h1::io: parsed 4 headers [ 1198.079480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: hyper::proto::h1::conn: incoming body is empty [ 1198.079478s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59510}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59510 [ 1198.079491s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50770 [ 1198.079507s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59508}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1198.079588s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: hyper::proto::h1::io: flushed 106 bytes [ 1198.079613s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59510}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1198.079619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1198.079643s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50770}: linkerd_app_core::serve: Connection closed [ 1198.079662s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1198.079676s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.753µs [ 1198.079689s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1198.079697s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1198.079716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: hyper::proto::h1::io: parsed 4 headers [ 1198.079740s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: hyper::proto::h1::conn: incoming body is empty [ 1198.079714s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59508}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55110 keepalive=None [ 1198.079749s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50776 [ 1198.079755s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59508}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1198.079813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59510}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55112 keepalive=None [ 1198.079832s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59510}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1198.079840s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: hyper::proto::h1::io: flushed 107 bytes [ 1198.079872s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1198.079901s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50776}: linkerd_app_core::serve: Connection closed [ 1198.081883s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59508}: linkerd_app_core::serve: Connection closed [ 1198.082160s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59510}: linkerd_app_core::serve: Connection closed [ 1198.674384s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(239), flags: (0x5: END_HEADERS | END_STREAM) } [ 1198.674443s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1198.675511s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(239), flags: (0x4: END_HEADERS) } [ 1198.675539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(239), flags: (0x1: END_STREAM) } [ 1203.079663s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59584}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1203.079704s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59584}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59584 [ 1203.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59582}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1203.079753s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59582}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59582 [ 1203.079777s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1203.079860s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1203.079944s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55182 keepalive=None [ 1203.079955s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59584}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1203.079986s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59582}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55184 keepalive=None [ 1203.080004s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59582}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1203.082251s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59584}: linkerd_app_core::serve: Connection closed [ 1203.082310s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59582}: linkerd_app_core::serve: Connection closed [ 1208.079562s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59668}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1208.079597s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1208.079621s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59668}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59668 [ 1208.079638s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.692µs [ 1208.079646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1208.079652s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1208.079676s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: hyper::proto::h1::io: parsed 4 headers [ 1208.079689s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: hyper::proto::h1::conn: incoming body is empty [ 1208.079670s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59670}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1208.079696s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59670}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59670 [ 1208.079699s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50932 [ 1208.079741s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59668}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1208.079799s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: hyper::proto::h1::io: flushed 107 bytes [ 1208.079824s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1208.079840s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59670}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1208.079853s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50932}: linkerd_app_core::serve: Connection closed [ 1208.079873s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1208.079882s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.537µs [ 1208.079887s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1208.079891s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1208.079905s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: hyper::proto::h1::io: parsed 4 headers [ 1208.079926s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: hyper::proto::h1::conn: incoming body is empty [ 1208.079906s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59668}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55272 keepalive=None [ 1208.079941s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:50930 [ 1208.079947s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59668}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1208.079972s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59670}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55274 keepalive=None [ 1208.079982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59670}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1208.079992s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: hyper::proto::h1::io: flushed 106 bytes [ 1208.080008s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1208.080026s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:50930}: linkerd_app_core::serve: Connection closed [ 1208.082103s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59670}: linkerd_app_core::serve: Connection closed [ 1208.082211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59668}: linkerd_app_core::serve: Connection closed [ 1208.674850s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(241), flags: (0x5: END_HEADERS | END_STREAM) } [ 1208.674905s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1208.675784s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(241), flags: (0x4: END_HEADERS) } [ 1208.675816s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(241), flags: (0x1: END_STREAM) } [ 1210.338000s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1210.338060s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1210.338074s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1213.079259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59740}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1213.079306s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59740}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59740 [ 1213.079343s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59738}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1213.079354s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59738}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59738 [ 1213.079378s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59740}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1213.079445s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59738}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1213.079501s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59740}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55338 keepalive=None [ 1213.079508s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59740}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1213.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59738}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55340 keepalive=None [ 1213.079533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59738}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1213.081699s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59740}: linkerd_app_core::serve: Connection closed [ 1213.081742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59738}: linkerd_app_core::serve: Connection closed [ 1218.079843s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59814}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1218.079887s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1218.079885s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59814}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59814 [ 1218.079910s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.945µs [ 1218.079918s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1218.079926s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1218.079923s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59816}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1218.079931s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59816}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59816 [ 1218.079953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59814}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1218.079955s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: hyper::proto::h1::io: parsed 4 headers [ 1218.079981s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: hyper::proto::h1::conn: incoming body is empty [ 1218.079994s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51076 [ 1218.080044s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59816}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1218.080072s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: hyper::proto::h1::io: flushed 107 bytes [ 1218.080103s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1218.080110s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59814}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55414 keepalive=None [ 1218.080118s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59814}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1218.080131s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51076}: linkerd_app_core::serve: Connection closed [ 1218.080138s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59816}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55416 keepalive=None [ 1218.080142s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59816}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1218.080143s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1218.080157s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.538µs [ 1218.080163s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1218.080168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1218.080185s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: hyper::proto::h1::io: parsed 4 headers [ 1218.080188s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: hyper::proto::h1::conn: incoming body is empty [ 1218.080196s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51080 [ 1218.080257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: hyper::proto::h1::io: flushed 106 bytes [ 1218.080278s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1218.080293s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51080}: linkerd_app_core::serve: Connection closed [ 1218.082255s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59816}: linkerd_app_core::serve: Connection closed [ 1218.082299s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59814}: linkerd_app_core::serve: Connection closed [ 1218.674621s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(243), flags: (0x5: END_HEADERS | END_STREAM) } [ 1218.674681s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1218.675676s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(243), flags: (0x4: END_HEADERS) } [ 1218.675706s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(243), flags: (0x1: END_STREAM) } [ 1223.079815s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59878}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1223.079860s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59878}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59878 [ 1223.079902s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59880}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1223.079912s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59880}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59880 [ 1223.079938s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59878}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1223.080027s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59880}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1223.080101s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59878}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55478 keepalive=None [ 1223.080113s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59878}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1223.080131s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59880}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55480 keepalive=None [ 1223.080142s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59880}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1223.082275s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59878}: linkerd_app_core::serve: Connection closed [ 1223.082322s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59880}: linkerd_app_core::serve: Connection closed [ 1228.079614s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59954}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1228.079654s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1228.079679s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59954}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59954 [ 1228.079718s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.399µs [ 1228.079732s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1228.079739s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1228.079731s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59956}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1228.079762s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59956}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:59956 [ 1228.079779s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: hyper::proto::h1::io: parsed 4 headers [ 1228.079790s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: hyper::proto::h1::conn: incoming body is empty [ 1228.079790s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59954}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1228.079808s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51222 [ 1228.079890s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: hyper::proto::h1::io: flushed 106 bytes [ 1228.079915s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1228.079918s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59956}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1228.079962s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51222}: linkerd_app_core::serve: Connection closed [ 1228.080028s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1228.080045s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.182µs [ 1228.080051s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1228.080057s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1228.080075s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: hyper::proto::h1::io: parsed 4 headers [ 1228.080080s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: hyper::proto::h1::conn: incoming body is empty [ 1228.080086s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51216 [ 1228.080103s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59954}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55556 keepalive=None [ 1228.080125s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59954}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1228.080151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59956}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55558 keepalive=None [ 1228.080154s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: hyper::proto::h1::io: flushed 107 bytes [ 1228.080157s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59956}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1228.080172s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1228.080188s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51216}: linkerd_app_core::serve: Connection closed [ 1228.082033s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59954}: linkerd_app_core::serve: Connection closed [ 1228.082085s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:59956}: linkerd_app_core::serve: Connection closed [ 1228.675256s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(245), flags: (0x5: END_HEADERS | END_STREAM) } [ 1228.675311s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1228.676195s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(245), flags: (0x4: END_HEADERS) } [ 1228.676222s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(245), flags: (0x1: END_STREAM) } [ 1230.337290s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1230.337343s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1230.337350s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1233.079838s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60020}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1233.079873s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60020}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60020 [ 1233.079904s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60022}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1233.079912s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60022}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60022 [ 1233.079955s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60020}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1233.080055s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60022}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1233.080127s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60020}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55620 keepalive=None [ 1233.080147s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60020}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1233.080172s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60022}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55622 keepalive=None [ 1233.080177s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60022}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1233.082129s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60020}: linkerd_app_core::serve: Connection closed [ 1233.082471s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60022}: linkerd_app_core::serve: Connection closed [ 1238.079227s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60102}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1238.079255s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1238.079286s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60102}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60102 [ 1238.079307s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.067µs [ 1238.079317s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1238.079325s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1238.079343s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60100}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1238.079362s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: hyper::proto::h1::io: parsed 4 headers [ 1238.079362s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60100}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60100 [ 1238.079365s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: hyper::proto::h1::conn: incoming body is empty [ 1238.079378s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51368 [ 1238.079393s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60102}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1238.079490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: hyper::proto::h1::io: flushed 106 bytes [ 1238.079504s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60100}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1238.079523s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1238.079550s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51368}: linkerd_app_core::serve: Connection closed [ 1238.079565s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1238.079589s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.625µs [ 1238.079625s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1238.079633s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1238.079641s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60102}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55704 keepalive=None [ 1238.079654s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60102}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1238.079658s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: hyper::proto::h1::io: parsed 4 headers [ 1238.079663s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: hyper::proto::h1::conn: incoming body is empty [ 1238.079672s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51370 [ 1238.079695s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60100}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55706 keepalive=None [ 1238.079702s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60100}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1238.079770s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: hyper::proto::h1::io: flushed 107 bytes [ 1238.079802s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1238.079823s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51370}: linkerd_app_core::serve: Connection closed [ 1238.081764s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60102}: linkerd_app_core::serve: Connection closed [ 1238.081894s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60100}: linkerd_app_core::serve: Connection closed [ 1238.674447s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(247), flags: (0x5: END_HEADERS | END_STREAM) } [ 1238.674517s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1238.675582s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(247), flags: (0x4: END_HEADERS) } [ 1238.675608s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(247), flags: (0x1: END_STREAM) } [ 1243.079780s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60164}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1243.079827s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60164}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60164 [ 1243.079871s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60166}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1243.079893s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60166}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60166 [ 1243.079927s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60164}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1243.080016s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60166}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1243.080097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60164}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55764 keepalive=None [ 1243.080113s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60164}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1243.080135s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60166}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55766 keepalive=None [ 1243.080146s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60166}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1243.082235s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60164}: linkerd_app_core::serve: Connection closed [ 1243.082543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60166}: linkerd_app_core::serve: Connection closed [ 1248.079905s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60244}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1248.079937s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1248.079958s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60244}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60244 [ 1248.079977s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.843µs [ 1248.079984s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1248.079990s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1248.080000s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60242}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1248.080029s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60242}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60242 [ 1248.080015s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: hyper::proto::h1::io: parsed 4 headers [ 1248.080049s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: hyper::proto::h1::conn: incoming body is empty [ 1248.080063s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60244}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1248.080060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51506 [ 1248.080142s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: hyper::proto::h1::io: flushed 106 bytes [ 1248.080149s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60242}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1248.080168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1248.080192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51506}: linkerd_app_core::serve: Connection closed [ 1248.080202s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1248.080211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.416µs [ 1248.080228s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1248.080234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1248.080214s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60244}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55846 keepalive=None [ 1248.080242s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60244}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1248.080249s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: hyper::proto::h1::io: parsed 4 headers [ 1248.080253s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: hyper::proto::h1::conn: incoming body is empty [ 1248.080259s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51512 [ 1248.080267s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60242}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55848 keepalive=None [ 1248.080272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60242}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1248.080316s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: hyper::proto::h1::io: flushed 107 bytes [ 1248.080340s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1248.080352s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51512}: linkerd_app_core::serve: Connection closed [ 1248.082239s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60244}: linkerd_app_core::serve: Connection closed [ 1248.082278s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60242}: linkerd_app_core::serve: Connection closed [ 1248.675327s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(249), flags: (0x5: END_HEADERS | END_STREAM) } [ 1248.675393s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1248.676459s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(249), flags: (0x4: END_HEADERS) } [ 1248.676490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(249), flags: (0x1: END_STREAM) } [ 1253.079633s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60306}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1253.079682s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60306}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60306 [ 1253.079729s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60304}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1253.079737s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60304}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60304 [ 1253.079780s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60306}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1253.079871s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60304}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1253.079959s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60306}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55904 keepalive=None [ 1253.079969s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60306}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1253.079992s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60304}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55906 keepalive=None [ 1253.079996s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60304}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1253.082250s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60304}: linkerd_app_core::serve: Connection closed [ 1253.082616s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60306}: linkerd_app_core::serve: Connection closed [ 1258.079650s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60376}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1258.079684s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1258.079707s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60376}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60376 [ 1258.079727s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.648µs [ 1258.079737s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1258.079746s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1258.079760s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60378}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1258.079781s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60378}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60378 [ 1258.079784s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: hyper::proto::h1::io: parsed 4 headers [ 1258.079808s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: hyper::proto::h1::conn: incoming body is empty [ 1258.079831s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60376}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1258.079830s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51638 [ 1258.079973s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: hyper::proto::h1::io: flushed 107 bytes [ 1258.079988s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60378}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1258.080020s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1258.080061s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51638}: linkerd_app_core::serve: Connection closed [ 1258.080062s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60376}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55982 keepalive=None [ 1258.080119s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60376}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1258.080100s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1258.080141s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.16µs [ 1258.080148s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1258.080149s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60378}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:55984 keepalive=None [ 1258.080153s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1258.080154s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60378}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1258.080169s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: hyper::proto::h1::io: parsed 4 headers [ 1258.080182s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: hyper::proto::h1::conn: incoming body is empty [ 1258.080192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51640 [ 1258.080253s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: hyper::proto::h1::io: flushed 106 bytes [ 1258.080287s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1258.080304s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51640}: linkerd_app_core::serve: Connection closed [ 1258.082481s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60376}: linkerd_app_core::serve: Connection closed [ 1258.082523s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60378}: linkerd_app_core::serve: Connection closed [ 1258.674833s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(251), flags: (0x5: END_HEADERS | END_STREAM) } [ 1258.674889s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1258.675808s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(251), flags: (0x4: END_HEADERS) } [ 1258.675836s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(251), flags: (0x1: END_STREAM) } [ 1263.079079s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60456}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1263.079118s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60456}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60456 [ 1263.079184s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60458}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1263.079201s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60458}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60458 [ 1263.079241s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60456}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1263.079333s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60458}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1263.079412s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60456}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56056 keepalive=None [ 1263.079426s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60456}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1263.079457s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60458}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56058 keepalive=None [ 1263.079463s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60458}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1263.081648s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60456}: linkerd_app_core::serve: Connection closed [ 1263.081709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60458}: linkerd_app_core::serve: Connection closed [ 1268.079773s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60538}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1268.079821s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60538}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60538 [ 1268.079836s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1268.079861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.866µs [ 1268.079880s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1268.079877s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60536}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1268.079889s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1268.079901s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60536}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60536 [ 1268.079959s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: hyper::proto::h1::io: parsed 4 headers [ 1268.079966s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60538}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1268.079968s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: hyper::proto::h1::conn: incoming body is empty [ 1268.080023s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51800 [ 1268.080070s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60536}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1268.080152s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60538}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56140 keepalive=None [ 1268.080166s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60538}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1268.080185s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: hyper::proto::h1::io: flushed 107 bytes [ 1268.080191s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60536}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56142 keepalive=None [ 1268.080197s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60536}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1268.080209s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1268.080234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51800}: linkerd_app_core::serve: Connection closed [ 1268.080257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1268.080278s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.398µs [ 1268.080283s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1268.080287s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1268.080301s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: hyper::proto::h1::io: parsed 4 headers [ 1268.080308s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: hyper::proto::h1::conn: incoming body is empty [ 1268.080312s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51798 [ 1268.080364s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: hyper::proto::h1::io: flushed 106 bytes [ 1268.080384s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1268.080399s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51798}: linkerd_app_core::serve: Connection closed [ 1268.082185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60536}: linkerd_app_core::serve: Connection closed [ 1268.082221s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60538}: linkerd_app_core::serve: Connection closed [ 1268.674298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(253), flags: (0x5: END_HEADERS | END_STREAM) } [ 1268.674360s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1268.675380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(253), flags: (0x4: END_HEADERS) } [ 1268.675407s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(253), flags: (0x1: END_STREAM) } [ 1270.338468s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1270.338534s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1270.338544s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1273.079717s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60608}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1273.079764s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60608}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60608 [ 1273.079806s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60606}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1273.079818s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60606}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60606 [ 1273.079845s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60608}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1273.079920s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60606}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1273.079993s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60608}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56206 keepalive=None [ 1273.080006s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60608}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1273.080033s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60606}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56208 keepalive=None [ 1273.080044s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60606}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1273.082114s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60606}: linkerd_app_core::serve: Connection closed [ 1273.082170s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60608}: linkerd_app_core::serve: Connection closed [ 1278.079374s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60680}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1278.079423s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60680}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60680 [ 1278.079479s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60682}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1278.079498s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60682}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60682 [ 1278.079540s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60680}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1278.079654s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60682}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1278.079743s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60680}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56284 keepalive=None [ 1278.079756s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60680}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1278.079775s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60682}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56286 keepalive=None [ 1278.079779s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60682}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1278.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1278.079845s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.166µs [ 1278.079858s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1278.079865s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1278.079893s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: hyper::proto::h1::io: parsed 4 headers [ 1278.079901s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: hyper::proto::h1::conn: incoming body is empty [ 1278.079915s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51950 [ 1278.080000s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: hyper::proto::h1::io: flushed 107 bytes [ 1278.080030s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1278.080052s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51950}: linkerd_app_core::serve: Connection closed [ 1278.080064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1278.080073s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.768µs [ 1278.080078s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1278.080082s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1278.080095s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: hyper::proto::h1::io: parsed 4 headers [ 1278.080098s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: hyper::proto::h1::conn: incoming body is empty [ 1278.080103s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:51948 [ 1278.080150s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: hyper::proto::h1::io: flushed 106 bytes [ 1278.080167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1278.080180s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:51948}: linkerd_app_core::serve: Connection closed [ 1278.083451s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60682}: linkerd_app_core::serve: Connection closed [ 1278.083511s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60680}: linkerd_app_core::serve: Connection closed [ 1278.674550s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(255), flags: (0x5: END_HEADERS | END_STREAM) } [ 1278.674615s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1278.675571s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(255), flags: (0x4: END_HEADERS) } [ 1278.675606s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(255), flags: (0x1: END_STREAM) } [ 1283.079518s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60750}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1283.079553s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60750}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60750 [ 1283.079594s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60752}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1283.079612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60752}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60752 [ 1283.079642s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60750}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1283.079719s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60752}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1283.079786s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60750}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56350 keepalive=None [ 1283.079794s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60750}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1283.079816s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60752}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56352 keepalive=None [ 1283.079821s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60752}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1283.082042s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60750}: linkerd_app_core::serve: Connection closed [ 1283.082080s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60752}: linkerd_app_core::serve: Connection closed [ 1288.079895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60828}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1288.079925s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1288.079950s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60828}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60828 [ 1288.079987s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60826}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1288.079974s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.223µs [ 1288.080022s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1288.080008s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60826}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60826 [ 1288.080030s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1288.080057s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60828}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1288.080066s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: hyper::proto::h1::io: parsed 4 headers [ 1288.080071s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: hyper::proto::h1::conn: incoming body is empty [ 1288.080084s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52092 [ 1288.080155s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60826}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1288.080165s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: hyper::proto::h1::io: flushed 106 bytes [ 1288.080187s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1288.080208s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52092}: linkerd_app_core::serve: Connection closed [ 1288.080220s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1288.080231s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.929µs [ 1288.080258s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1288.080265s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1288.080238s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60828}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56430 keepalive=None [ 1288.080283s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: hyper::proto::h1::io: parsed 4 headers [ 1288.080286s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: hyper::proto::h1::conn: incoming body is empty [ 1288.080286s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60828}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1288.080293s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52088 [ 1288.080315s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60826}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56432 keepalive=None [ 1288.080326s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60826}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1288.080347s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: hyper::proto::h1::io: flushed 107 bytes [ 1288.080375s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1288.080390s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52088}: linkerd_app_core::serve: Connection closed [ 1288.082462s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60828}: linkerd_app_core::serve: Connection closed [ 1288.082516s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60826}: linkerd_app_core::serve: Connection closed [ 1288.674578s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(257), flags: (0x5: END_HEADERS | END_STREAM) } [ 1288.674640s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1288.675722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(257), flags: (0x4: END_HEADERS) } [ 1288.675759s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(257), flags: (0x1: END_STREAM) } [ 1293.078993s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60894}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1293.079030s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60894}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60894 [ 1293.079074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60892}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1293.079092s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60892}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60892 [ 1293.079153s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60894}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1293.079248s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60892}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1293.079317s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60894}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56492 keepalive=None [ 1293.079330s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60894}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1293.079393s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60892}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56494 keepalive=None [ 1293.079399s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60892}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1293.082543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60894}: linkerd_app_core::serve: Connection closed [ 1293.082596s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60892}: linkerd_app_core::serve: Connection closed [ 1298.079705s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60970}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1298.079751s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60970}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60970 [ 1298.079796s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60968}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1298.079813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60968}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:60968 [ 1298.079845s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60970}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1298.079937s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60968}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1298.079996s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60970}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56572 keepalive=None [ 1298.080009s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60970}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1298.080030s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60968}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56574 keepalive=None [ 1298.080038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60968}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1298.080144s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1298.080165s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.754µs [ 1298.080179s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1298.080187s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1298.080217s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: hyper::proto::h1::io: parsed 4 headers [ 1298.080221s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: hyper::proto::h1::conn: incoming body is empty [ 1298.080233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52238 [ 1298.080305s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: hyper::proto::h1::io: flushed 107 bytes [ 1298.080325s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1298.080342s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52238}: linkerd_app_core::serve: Connection closed [ 1298.080351s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1298.080359s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.015µs [ 1298.080364s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1298.080368s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1298.080380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: hyper::proto::h1::io: parsed 4 headers [ 1298.080383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: hyper::proto::h1::conn: incoming body is empty [ 1298.080388s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52236 [ 1298.080438s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: hyper::proto::h1::io: flushed 106 bytes [ 1298.080454s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1298.080468s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52236}: linkerd_app_core::serve: Connection closed [ 1298.082589s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60970}: linkerd_app_core::serve: Connection closed [ 1298.082740s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:60968}: linkerd_app_core::serve: Connection closed [ 1298.674742s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(259), flags: (0x5: END_HEADERS | END_STREAM) } [ 1298.674811s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1298.675837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(259), flags: (0x4: END_HEADERS) } [ 1298.675864s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(259), flags: (0x1: END_STREAM) } [ 1303.079180s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32802}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1303.079217s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32802}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:32802 [ 1303.079259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32804}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1303.079277s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32804}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:32804 [ 1303.079310s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32802}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1303.079397s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32804}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1303.079476s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32802}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56634 keepalive=None [ 1303.079500s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32802}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1303.079522s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32804}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56636 keepalive=None [ 1303.079531s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32804}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1303.081846s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32802}: linkerd_app_core::serve: Connection closed [ 1303.081927s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32804}: linkerd_app_core::serve: Connection closed [ 1308.079917s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32874}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1308.079962s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32874}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:32874 [ 1308.079977s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1308.080003s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.716µs [ 1308.080008s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32876}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1308.080017s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1308.080025s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1308.080021s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32876}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:32876 [ 1308.080058s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: hyper::proto::h1::io: parsed 4 headers [ 1308.080065s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: hyper::proto::h1::conn: incoming body is empty [ 1308.080074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32874}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1308.080074s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52376 [ 1308.080159s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: hyper::proto::h1::io: flushed 106 bytes [ 1308.080165s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32876}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1308.080183s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1308.080203s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52376}: linkerd_app_core::serve: Connection closed [ 1308.080213s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1308.080219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32874}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56710 keepalive=None [ 1308.080223s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.687µs [ 1308.080225s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32874}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1308.080229s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1308.080234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1308.080248s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32876}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56712 keepalive=None [ 1308.080272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32876}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1308.080250s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: hyper::proto::h1::io: parsed 4 headers [ 1308.080291s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: hyper::proto::h1::conn: incoming body is empty [ 1308.080296s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52368 [ 1308.080368s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: hyper::proto::h1::io: flushed 107 bytes [ 1308.080386s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1308.080400s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52368}: linkerd_app_core::serve: Connection closed [ 1308.082352s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32876}: linkerd_app_core::serve: Connection closed [ 1308.082398s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32874}: linkerd_app_core::serve: Connection closed [ 1308.674336s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(261), flags: (0x5: END_HEADERS | END_STREAM) } [ 1308.674390s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1308.675468s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(261), flags: (0x4: END_HEADERS) } [ 1308.675498s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(261), flags: (0x1: END_STREAM) } [ 1313.079188s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32942}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1313.079226s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32942}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:32942 [ 1313.079271s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32940}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1313.079289s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32940}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:32940 [ 1313.079322s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32942}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1313.079420s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32940}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1313.079492s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32942}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56772 keepalive=None [ 1313.079514s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32942}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1313.079544s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32940}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56774 keepalive=None [ 1313.079553s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32940}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1313.081851s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32940}: linkerd_app_core::serve: Connection closed [ 1313.081891s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:32942}: linkerd_app_core::serve: Connection closed [ 1318.079178s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33014}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1318.079222s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1318.079233s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33014}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33014 [ 1318.079257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.508µs [ 1318.079270s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1318.079280s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1318.079295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33010}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1318.079308s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: hyper::proto::h1::io: parsed 4 headers [ 1318.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: hyper::proto::h1::conn: incoming body is empty [ 1318.079324s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33010}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33010 [ 1318.079362s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52504 [ 1318.079398s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33014}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1318.079477s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: hyper::proto::h1::io: flushed 107 bytes [ 1318.079517s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1318.079537s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33010}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1318.079543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52504}: linkerd_app_core::serve: Connection closed [ 1318.079584s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1318.079612s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.07µs [ 1318.079619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1318.079624s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1318.079646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: hyper::proto::h1::io: parsed 4 headers [ 1318.079651s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: hyper::proto::h1::conn: incoming body is empty [ 1318.079659s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52506 [ 1318.079663s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33014}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56846 keepalive=None [ 1318.079676s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33014}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1318.079706s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33010}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56848 keepalive=None [ 1318.079752s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33010}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1318.079729s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: hyper::proto::h1::io: flushed 106 bytes [ 1318.079801s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1318.079854s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52506}: linkerd_app_core::serve: Connection closed [ 1318.081787s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33010}: linkerd_app_core::serve: Connection closed [ 1318.082077s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33014}: linkerd_app_core::serve: Connection closed [ 1318.674979s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(263), flags: (0x5: END_HEADERS | END_STREAM) } [ 1318.675045s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1318.675951s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(263), flags: (0x4: END_HEADERS) } [ 1318.675982s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(263), flags: (0x1: END_STREAM) } [ 1323.078930s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33084}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1323.078978s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33084}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33084 [ 1323.079030s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33086}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1323.079051s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33086}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33086 [ 1323.079084s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33084}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1323.079171s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33086}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1323.079219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33084}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56914 keepalive=None [ 1323.079229s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33084}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1323.079331s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33086}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56916 keepalive=None [ 1323.079341s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33086}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1323.081406s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33084}: linkerd_app_core::serve: Connection closed [ 1323.081450s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33086}: linkerd_app_core::serve: Connection closed [ 1328.079623s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33162}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1328.079660s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1328.079701s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33162}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33162 [ 1328.079726s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.699µs [ 1328.079754s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1328.079765s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1328.079758s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33164}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1328.079771s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33164}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33164 [ 1328.079796s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33162}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1328.079802s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: hyper::proto::h1::io: parsed 4 headers [ 1328.079863s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: hyper::proto::h1::conn: incoming body is empty [ 1328.079880s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52664 [ 1328.079920s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33164}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1328.079972s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: hyper::proto::h1::io: flushed 106 bytes [ 1328.079998s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1328.080006s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33162}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:56998 keepalive=None [ 1328.080016s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33162}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1328.080022s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52664}: linkerd_app_core::serve: Connection closed [ 1328.080036s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1328.080041s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33164}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57000 keepalive=None [ 1328.080046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33164}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1328.080049s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.129µs [ 1328.080055s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1328.080062s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1328.080080s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: hyper::proto::h1::io: parsed 4 headers [ 1328.080092s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: hyper::proto::h1::conn: incoming body is empty [ 1328.080099s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52656 [ 1328.080167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: hyper::proto::h1::io: flushed 107 bytes [ 1328.080191s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1328.080211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52656}: linkerd_app_core::serve: Connection closed [ 1328.082146s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33164}: linkerd_app_core::serve: Connection closed [ 1328.082221s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33162}: linkerd_app_core::serve: Connection closed [ 1328.674988s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(265), flags: (0x5: END_HEADERS | END_STREAM) } [ 1328.675047s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1328.676065s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(265), flags: (0x4: END_HEADERS) } [ 1328.676096s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(265), flags: (0x1: END_STREAM) } [ 1330.337181s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1330.337267s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1330.337285s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1333.079840s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33234}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1333.079891s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33234}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33234 [ 1333.079950s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33232}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1333.079966s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33232}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33232 [ 1333.080007s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1333.080108s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1333.080180s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57064 keepalive=None [ 1333.080189s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33234}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1333.080205s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57066 keepalive=None [ 1333.080208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33232}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1333.082403s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33234}: linkerd_app_core::serve: Connection closed [ 1333.082453s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33232}: linkerd_app_core::serve: Connection closed [ 1338.079650s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33302}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1338.079697s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33302}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33302 [ 1338.079717s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1338.079746s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.436µs [ 1338.079769s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1338.079748s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33304}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1338.079777s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1338.079778s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33304}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33304 [ 1338.079807s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: hyper::proto::h1::io: parsed 4 headers [ 1338.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: hyper::proto::h1::conn: incoming body is empty [ 1338.079818s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33302}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1338.079826s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52798 [ 1338.079908s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33304}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1338.079915s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: hyper::proto::h1::io: flushed 106 bytes [ 1338.079942s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1338.079963s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52798}: linkerd_app_core::serve: Connection closed [ 1338.079977s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1338.079988s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.128µs [ 1338.080000s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1338.080004s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1338.080017s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: hyper::proto::h1::io: parsed 4 headers [ 1338.080021s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: hyper::proto::h1::conn: incoming body is empty [ 1338.080027s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52796 [ 1338.080036s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33302}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57138 keepalive=None [ 1338.080055s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33302}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1338.080080s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33304}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57140 keepalive=None [ 1338.080084s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33304}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1338.080086s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: hyper::proto::h1::io: flushed 107 bytes [ 1338.080104s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1338.080118s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52796}: linkerd_app_core::serve: Connection closed [ 1338.082092s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33302}: linkerd_app_core::serve: Connection closed [ 1338.082287s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33304}: linkerd_app_core::serve: Connection closed [ 1338.674653s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(267), flags: (0x5: END_HEADERS | END_STREAM) } [ 1338.674714s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1338.675682s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(267), flags: (0x4: END_HEADERS) } [ 1338.675716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(267), flags: (0x1: END_STREAM) } [ 1343.079492s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33372}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1343.079538s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33372}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33372 [ 1343.079577s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33370}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1343.079588s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33370}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33370 [ 1343.079615s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33372}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1343.079685s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33370}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1343.079762s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33372}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57200 keepalive=None [ 1343.079781s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33372}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1343.079811s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33370}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57202 keepalive=None [ 1343.079816s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33370}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1343.082087s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33372}: linkerd_app_core::serve: Connection closed [ 1343.082133s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33370}: linkerd_app_core::serve: Connection closed [ 1348.079559s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33442}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1348.079592s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1348.079609s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33442}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33442 [ 1348.079636s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.228µs [ 1348.079647s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1348.079654s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1348.079651s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33440}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1348.079681s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33440}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33440 [ 1348.079700s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: hyper::proto::h1::io: parsed 4 headers [ 1348.079707s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: hyper::proto::h1::conn: incoming body is empty [ 1348.079708s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33442}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1348.079720s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52942 [ 1348.079809s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33440}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1348.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: hyper::proto::h1::io: flushed 107 bytes [ 1348.079874s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1348.079894s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52942}: linkerd_app_core::serve: Connection closed [ 1348.079896s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33442}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57276 keepalive=None [ 1348.079927s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1348.079930s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33442}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1348.079939s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.728µs [ 1348.079946s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1348.079952s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1348.079960s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33440}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57278 keepalive=None [ 1348.079967s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: hyper::proto::h1::io: parsed 4 headers [ 1348.079968s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33440}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1348.079971s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: hyper::proto::h1::conn: incoming body is empty [ 1348.079978s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:52940 [ 1348.080044s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: hyper::proto::h1::io: flushed 106 bytes [ 1348.080063s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1348.080078s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:52940}: linkerd_app_core::serve: Connection closed [ 1348.081949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33442}: linkerd_app_core::serve: Connection closed [ 1348.082007s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33440}: linkerd_app_core::serve: Connection closed [ 1348.675119s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(269), flags: (0x5: END_HEADERS | END_STREAM) } [ 1348.675188s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1348.676063s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(269), flags: (0x4: END_HEADERS) } [ 1348.676097s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(269), flags: (0x1: END_STREAM) } [ 1350.339350s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1350.339418s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1350.339435s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1353.079624s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33510}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1353.079672s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33510}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33510 [ 1353.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33512}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1353.079731s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33512}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33512 [ 1353.079757s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33510}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1353.079832s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33512}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1353.079895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33510}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57342 keepalive=None [ 1353.079902s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33510}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1353.079926s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33512}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57344 keepalive=None [ 1353.079930s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33512}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1353.082098s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33512}: linkerd_app_core::serve: Connection closed [ 1353.082155s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33510}: linkerd_app_core::serve: Connection closed [ 1358.079579s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33578}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1358.079606s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1358.079633s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33578}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33578 [ 1358.079654s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.017µs [ 1358.079664s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1358.079673s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1358.079684s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33584}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1358.079705s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33584}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33584 [ 1358.079715s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: hyper::proto::h1::io: parsed 4 headers [ 1358.079718s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: hyper::proto::h1::conn: incoming body is empty [ 1358.079733s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33578}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1358.079736s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53072 [ 1358.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: hyper::proto::h1::io: flushed 106 bytes [ 1358.079828s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1358.079838s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1358.079858s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53072}: linkerd_app_core::serve: Connection closed [ 1358.079870s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1358.079881s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.338µs [ 1358.079886s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1358.079891s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1358.079894s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33578}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57412 keepalive=None [ 1358.079900s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33578}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1358.079905s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: hyper::proto::h1::io: parsed 4 headers [ 1358.079908s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: hyper::proto::h1::conn: incoming body is empty [ 1358.079914s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53076 [ 1358.079921s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33584}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57414 keepalive=None [ 1358.079924s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33584}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1358.079963s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: hyper::proto::h1::io: flushed 107 bytes [ 1358.079979s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1358.079992s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53076}: linkerd_app_core::serve: Connection closed [ 1358.081945s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33584}: linkerd_app_core::serve: Connection closed [ 1358.081994s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33578}: linkerd_app_core::serve: Connection closed [ 1358.674307s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(271), flags: (0x5: END_HEADERS | END_STREAM) } [ 1358.674359s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1358.675274s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(271), flags: (0x4: END_HEADERS) } [ 1358.675299s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(271), flags: (0x1: END_STREAM) } [ 1360.342057s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1360.342109s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1360.342116s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1363.079623s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33654}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1363.079660s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33654}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33654 [ 1363.079708s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33652}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1363.079727s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33652}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33652 [ 1363.079769s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33654}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1363.079856s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33652}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1363.079921s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33654}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57484 keepalive=None [ 1363.079941s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33654}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1363.079964s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33652}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57486 keepalive=None [ 1363.079968s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33652}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1363.081950s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33652}: linkerd_app_core::serve: Connection closed [ 1363.082292s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33654}: linkerd_app_core::serve: Connection closed [ 1368.079763s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33728}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1368.079795s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1368.079819s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33728}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33728 [ 1368.079845s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.897µs [ 1368.079855s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1368.079864s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1368.079868s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33730}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1368.079883s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33730}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33730 [ 1368.079905s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: hyper::proto::h1::io: parsed 4 headers [ 1368.079918s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: hyper::proto::h1::conn: incoming body is empty [ 1368.079930s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33728}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1368.079933s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53222 [ 1368.080063s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: hyper::proto::h1::io: flushed 107 bytes [ 1368.080106s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33730}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1368.080117s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1368.080157s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53222}: linkerd_app_core::serve: Connection closed [ 1368.080179s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1368.080197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.843µs [ 1368.080205s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1368.080211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1368.080230s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: hyper::proto::h1::io: parsed 4 headers [ 1368.080234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: hyper::proto::h1::conn: incoming body is empty [ 1368.080238s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33728}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57564 keepalive=None [ 1368.080249s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33728}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1368.080259s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53224 [ 1368.080271s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33730}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57566 keepalive=None [ 1368.080276s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33730}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1368.080343s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: hyper::proto::h1::io: flushed 106 bytes [ 1368.080401s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1368.080428s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53224}: linkerd_app_core::serve: Connection closed [ 1368.082470s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33730}: linkerd_app_core::serve: Connection closed [ 1368.082513s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33728}: linkerd_app_core::serve: Connection closed [ 1368.675196s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(273), flags: (0x5: END_HEADERS | END_STREAM) } [ 1368.675270s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1368.676277s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(273), flags: (0x4: END_HEADERS) } [ 1368.676305s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(273), flags: (0x1: END_STREAM) } [ 1370.335763s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1370.335823s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1370.335833s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1373.079503s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33794}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1373.079548s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33794}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33794 [ 1373.079589s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33796}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1373.079601s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33796}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33796 [ 1373.079638s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33794}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1373.079732s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33796}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1373.079798s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33794}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57626 keepalive=None [ 1373.079812s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33794}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1373.079845s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33796}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57628 keepalive=None [ 1373.079850s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33796}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1373.082287s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33794}: linkerd_app_core::serve: Connection closed [ 1373.082330s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33796}: linkerd_app_core::serve: Connection closed [ 1378.079690s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33872}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1378.079733s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1378.079746s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33872}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33872 [ 1378.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.185µs [ 1378.079772s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1378.079779s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1378.079789s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33870}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1378.079809s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33870}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33870 [ 1378.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: hyper::proto::h1::io: parsed 4 headers [ 1378.079817s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: hyper::proto::h1::conn: incoming body is empty [ 1378.079831s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53364 [ 1378.079841s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33872}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1378.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: hyper::proto::h1::io: flushed 106 bytes [ 1378.079929s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33870}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1378.079939s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1378.079966s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53364}: linkerd_app_core::serve: Connection closed [ 1378.079980s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1378.079991s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.888µs [ 1378.079996s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1378.080002s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1378.079997s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33872}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57706 keepalive=None [ 1378.080007s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33872}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1378.080017s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: hyper::proto::h1::io: parsed 4 headers [ 1378.080020s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: hyper::proto::h1::conn: incoming body is empty [ 1378.080026s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53372 [ 1378.080035s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33870}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57708 keepalive=None [ 1378.080040s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33870}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1378.080100s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: hyper::proto::h1::io: flushed 107 bytes [ 1378.080131s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1378.080150s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53372}: linkerd_app_core::serve: Connection closed [ 1378.082108s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33872}: linkerd_app_core::serve: Connection closed [ 1378.082539s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33870}: linkerd_app_core::serve: Connection closed [ 1378.674293s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(275), flags: (0x5: END_HEADERS | END_STREAM) } [ 1378.674358s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1378.675337s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(275), flags: (0x4: END_HEADERS) } [ 1378.675363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(275), flags: (0x1: END_STREAM) } [ 1380.338105s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1380.338196s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1380.338219s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1383.079179s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33950}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1383.079215s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33950}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33950 [ 1383.079249s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33948}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1383.079256s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33948}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:33948 [ 1383.079281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33950}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1383.079357s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33948}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1383.079418s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33950}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57780 keepalive=None [ 1383.079433s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33950}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1383.079459s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33948}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57782 keepalive=None [ 1383.079463s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33948}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1383.081630s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33950}: linkerd_app_core::serve: Connection closed [ 1383.081716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:33948}: linkerd_app_core::serve: Connection closed [ 1388.079183s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34020}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1388.079216s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1388.079242s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34020}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34020 [ 1388.079269s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.838µs [ 1388.079283s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1388.079284s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34018}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1388.079293s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1388.079294s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34018}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34018 [ 1388.079326s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34020}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1388.079329s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: hyper::proto::h1::io: parsed 4 headers [ 1388.079345s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: hyper::proto::h1::conn: incoming body is empty [ 1388.079359s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53512 [ 1388.079422s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34018}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1388.079461s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: hyper::proto::h1::io: flushed 106 bytes [ 1388.079489s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1388.079514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53512}: linkerd_app_core::serve: Connection closed [ 1388.079501s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34020}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57856 keepalive=None [ 1388.079529s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1388.079551s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34020}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1388.079566s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.01µs [ 1388.079573s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1388.079580s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1388.079579s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34018}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57858 keepalive=None [ 1388.079585s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34018}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1388.079596s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: hyper::proto::h1::io: parsed 4 headers [ 1388.079599s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: hyper::proto::h1::conn: incoming body is empty [ 1388.079606s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53514 [ 1388.079671s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: hyper::proto::h1::io: flushed 107 bytes [ 1388.079692s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1388.079716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53514}: linkerd_app_core::serve: Connection closed [ 1388.081792s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34018}: linkerd_app_core::serve: Connection closed [ 1388.081843s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34020}: linkerd_app_core::serve: Connection closed [ 1388.674994s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(277), flags: (0x5: END_HEADERS | END_STREAM) } [ 1388.675051s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1388.675998s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(277), flags: (0x4: END_HEADERS) } [ 1388.676026s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(277), flags: (0x1: END_STREAM) } [ 1390.338821s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1390.338911s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1390.338922s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1393.079390s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34096}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1393.079431s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34096}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34096 [ 1393.079470s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34098}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1393.079487s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34098}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34098 [ 1393.079538s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34096}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1393.079648s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34098}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1393.079721s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34096}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57928 keepalive=None [ 1393.079740s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34096}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1393.079766s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34098}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:57930 keepalive=None [ 1393.079770s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34098}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1393.081928s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34098}: linkerd_app_core::serve: Connection closed [ 1393.081989s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34096}: linkerd_app_core::serve: Connection closed [ 1398.079070s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34176}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1398.079104s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1398.079136s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=16.902µs [ 1398.079152s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1398.079112s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34176}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34176 [ 1398.079167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1398.079198s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: hyper::proto::h1::io: parsed 4 headers [ 1398.079206s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: hyper::proto::h1::conn: incoming body is empty [ 1398.079201s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34174}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1398.079212s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34174}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34174 [ 1398.079216s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53668 [ 1398.079238s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34176}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1398.079283s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: hyper::proto::h1::io: flushed 107 bytes [ 1398.079310s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1398.079331s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34174}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1398.079348s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53668}: linkerd_app_core::serve: Connection closed [ 1398.079358s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1398.079367s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.306µs [ 1398.079378s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1398.079382s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1398.079400s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: hyper::proto::h1::io: parsed 4 headers [ 1398.079408s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: hyper::proto::h1::conn: incoming body is empty [ 1398.079412s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34176}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58008 keepalive=None [ 1398.079413s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53674 [ 1398.079420s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34176}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1398.079445s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34174}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58010 keepalive=None [ 1398.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34174}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1398.079466s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: hyper::proto::h1::io: flushed 106 bytes [ 1398.079480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1398.079499s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53674}: linkerd_app_core::serve: Connection closed [ 1398.081453s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34176}: linkerd_app_core::serve: Connection closed [ 1398.081499s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34174}: linkerd_app_core::serve: Connection closed [ 1398.675062s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(279), flags: (0x5: END_HEADERS | END_STREAM) } [ 1398.675111s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1398.676069s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(279), flags: (0x4: END_HEADERS) } [ 1398.676097s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(279), flags: (0x1: END_STREAM) } [ 1400.342151s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1400.342213s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1400.342221s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1403.079540s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34240}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1403.079583s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34240}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34240 [ 1403.079621s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34242}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1403.079629s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34242}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34242 [ 1403.079649s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34240}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1403.079709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34242}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1403.079752s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34240}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58072 keepalive=None [ 1403.079761s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34240}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1403.079778s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34242}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58074 keepalive=None [ 1403.079787s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34242}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1403.081960s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34242}: linkerd_app_core::serve: Connection closed [ 1403.082015s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34240}: linkerd_app_core::serve: Connection closed [ 1408.079887s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34310}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1408.079920s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1408.079940s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34310}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34310 [ 1408.079968s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.037µs [ 1408.079978s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1408.079987s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1408.079993s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34312}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1408.080012s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34312}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34312 [ 1408.080021s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: hyper::proto::h1::io: parsed 4 headers [ 1408.080033s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: hyper::proto::h1::conn: incoming body is empty [ 1408.080048s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34310}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1408.080047s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53804 [ 1408.080156s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: hyper::proto::h1::io: flushed 106 bytes [ 1408.080173s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34312}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1408.080178s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1408.080197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53804}: linkerd_app_core::serve: Connection closed [ 1408.080216s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1408.080266s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34310}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58146 keepalive=None [ 1408.080257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.53µs [ 1408.080281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34310}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1408.080282s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1408.080289s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1408.080309s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34312}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58148 keepalive=None [ 1408.080331s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34312}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1408.080312s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: hyper::proto::h1::io: parsed 4 headers [ 1408.080342s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: hyper::proto::h1::conn: incoming body is empty [ 1408.080349s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53812 [ 1408.080416s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: hyper::proto::h1::io: flushed 107 bytes [ 1408.080433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1408.080447s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53812}: linkerd_app_core::serve: Connection closed [ 1408.082193s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34310}: linkerd_app_core::serve: Connection closed [ 1408.082481s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34312}: linkerd_app_core::serve: Connection closed [ 1408.674119s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(281), flags: (0x5: END_HEADERS | END_STREAM) } [ 1408.674170s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1408.675035s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(281), flags: (0x4: END_HEADERS) } [ 1408.675073s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(281), flags: (0x1: END_STREAM) } [ 1413.079303s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34378}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1413.079346s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34378}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34378 [ 1413.079383s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34376}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1413.079397s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34376}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34376 [ 1413.079424s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34378}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1413.079519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34376}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1413.079622s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34378}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58206 keepalive=None [ 1413.079635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34378}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1413.079684s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34376}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58208 keepalive=None [ 1413.079690s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34376}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1413.083211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34378}: linkerd_app_core::serve: Connection closed [ 1413.083254s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34376}: linkerd_app_core::serve: Connection closed [ 1418.079608s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34440}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1418.079659s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34440}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34440 [ 1418.079679s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1418.079703s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.893µs [ 1418.079710s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1418.079707s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34448}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1418.079716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1418.079716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34448}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34448 [ 1418.079738s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34440}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1418.079742s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: hyper::proto::h1::io: parsed 4 headers [ 1418.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: hyper::proto::h1::conn: incoming body is empty [ 1418.079772s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53936 [ 1418.079816s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34448}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1418.079844s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: hyper::proto::h1::io: flushed 106 bytes [ 1418.079866s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1418.079874s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34440}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58276 keepalive=None [ 1418.079880s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34440}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1418.079885s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53936}: linkerd_app_core::serve: Connection closed [ 1418.079898s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1418.079909s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34448}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58278 keepalive=None [ 1418.079910s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.21µs [ 1418.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34448}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1418.079916s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1418.079923s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1418.079939s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: hyper::proto::h1::io: parsed 4 headers [ 1418.079942s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: hyper::proto::h1::conn: incoming body is empty [ 1418.079947s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:53934 [ 1418.080006s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: hyper::proto::h1::io: flushed 107 bytes [ 1418.080019s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1418.080036s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:53934}: linkerd_app_core::serve: Connection closed [ 1418.081919s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34440}: linkerd_app_core::serve: Connection closed [ 1418.081951s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34448}: linkerd_app_core::serve: Connection closed [ 1418.674300s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(283), flags: (0x5: END_HEADERS | END_STREAM) } [ 1418.674363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1418.675394s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(283), flags: (0x4: END_HEADERS) } [ 1418.675429s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(283), flags: (0x1: END_STREAM) } [ 1423.079208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34512}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1423.079262s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34512}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34512 [ 1423.079321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34514}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1423.079337s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34514}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34514 [ 1423.079378s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34512}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1423.079491s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34514}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1423.079567s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34512}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58344 keepalive=None [ 1423.079583s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34512}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1423.079608s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34514}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58346 keepalive=None [ 1423.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34514}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1423.081680s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34514}: linkerd_app_core::serve: Connection closed [ 1423.081890s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34512}: linkerd_app_core::serve: Connection closed [ 1428.079678s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34588}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1428.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34588}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34588 [ 1428.079748s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1428.079768s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34586}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1428.079770s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.385µs [ 1428.079783s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34586}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34586 [ 1428.079798s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1428.079819s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1428.079830s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34588}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1428.079855s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: hyper::proto::h1::io: parsed 4 headers [ 1428.079865s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: hyper::proto::h1::conn: incoming body is empty [ 1428.079878s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54080 [ 1428.079916s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34586}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1428.079967s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: hyper::proto::h1::io: flushed 107 bytes [ 1428.079997s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1428.079999s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34588}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58422 keepalive=None [ 1428.080038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34588}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1428.080041s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54080}: linkerd_app_core::serve: Connection closed [ 1428.080078s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1428.080088s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.356µs [ 1428.080094s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1428.080100s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1428.080102s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34586}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58424 keepalive=None [ 1428.080109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34586}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1428.080113s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: hyper::proto::h1::io: parsed 4 headers [ 1428.080115s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: hyper::proto::h1::conn: incoming body is empty [ 1428.080139s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54088 [ 1428.080192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: hyper::proto::h1::io: flushed 106 bytes [ 1428.080208s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1428.080229s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54088}: linkerd_app_core::serve: Connection closed [ 1428.081932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34588}: linkerd_app_core::serve: Connection closed [ 1428.083277s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34586}: linkerd_app_core::serve: Connection closed [ 1428.675161s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(285), flags: (0x5: END_HEADERS | END_STREAM) } [ 1428.675217s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1428.676125s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(285), flags: (0x4: END_HEADERS) } [ 1428.676153s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(285), flags: (0x1: END_STREAM) } [ 1433.079936s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34656}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1433.080002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34656}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34656 [ 1433.080049s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34654}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1433.080063s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34654}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34654 [ 1433.080088s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34656}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1433.080164s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34654}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1433.080227s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34656}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58486 keepalive=None [ 1433.080242s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34656}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1433.080271s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34654}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58488 keepalive=None [ 1433.080281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34654}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1433.082142s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34656}: linkerd_app_core::serve: Connection closed [ 1433.082601s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34654}: linkerd_app_core::serve: Connection closed [ 1438.079390s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34734}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1438.079423s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1438.079456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34734}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34734 [ 1438.079475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.753µs [ 1438.079483s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1438.079489s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1438.079514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: hyper::proto::h1::io: parsed 4 headers [ 1438.079513s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34738}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1438.079523s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: hyper::proto::h1::conn: incoming body is empty [ 1438.079524s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34738}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34738 [ 1438.079533s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54228 [ 1438.079549s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34734}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1438.079602s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: hyper::proto::h1::io: flushed 106 bytes [ 1438.079627s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1438.079645s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34738}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1438.079650s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54228}: linkerd_app_core::serve: Connection closed [ 1438.079700s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1438.079716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.301µs [ 1438.079731s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1438.079737s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1438.079744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34734}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58568 keepalive=None [ 1438.079754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34734}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1438.079754s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: hyper::proto::h1::io: parsed 4 headers [ 1438.079758s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: hyper::proto::h1::conn: incoming body is empty [ 1438.079765s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54234 [ 1438.079776s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34738}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58570 keepalive=None [ 1438.079780s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34738}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1438.079845s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: hyper::proto::h1::io: flushed 107 bytes [ 1438.079874s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1438.079894s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54234}: linkerd_app_core::serve: Connection closed [ 1438.081813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34738}: linkerd_app_core::serve: Connection closed [ 1438.081856s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34734}: linkerd_app_core::serve: Connection closed [ 1438.674943s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(287), flags: (0x5: END_HEADERS | END_STREAM) } [ 1438.675002s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1438.676010s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(287), flags: (0x4: END_HEADERS) } [ 1438.676053s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(287), flags: (0x1: END_STREAM) } [ 1443.079252s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34812}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1443.079300s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34812}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34812 [ 1443.079344s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34810}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1443.079356s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34810}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34810 [ 1443.079382s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34812}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1443.079473s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34810}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1443.079561s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34812}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58642 keepalive=None [ 1443.079573s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34812}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1443.079598s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34810}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58644 keepalive=None [ 1443.079612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34810}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1443.081469s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34812}: linkerd_app_core::serve: Connection closed [ 1443.081526s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34810}: linkerd_app_core::serve: Connection closed [ 1448.079056s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34880}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1448.079093s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1448.079096s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34880}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34880 [ 1448.079117s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.376µs [ 1448.079144s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1448.079153s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1448.079158s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34882}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1448.079180s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: hyper::proto::h1::io: parsed 4 headers [ 1448.079176s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34882}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34882 [ 1448.079182s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: hyper::proto::h1::conn: incoming body is empty [ 1448.079192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54374 [ 1448.079210s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34880}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1448.079265s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: hyper::proto::h1::io: flushed 107 bytes [ 1448.079289s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1448.079297s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34882}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1448.079354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54374}: linkerd_app_core::serve: Connection closed [ 1448.079368s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1448.079376s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=2.745µs [ 1448.079380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1448.079383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1448.079393s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: hyper::proto::h1::io: parsed 4 headers [ 1448.079395s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: hyper::proto::h1::conn: incoming body is empty [ 1448.079398s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54380 [ 1448.079446s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34880}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58714 keepalive=None [ 1448.079451s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: hyper::proto::h1::io: flushed 106 bytes [ 1448.079454s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34880}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1448.079465s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1448.079476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54380}: linkerd_app_core::serve: Connection closed [ 1448.079484s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34882}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58716 keepalive=None [ 1448.079489s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34882}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1448.081435s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34880}: linkerd_app_core::serve: Connection closed [ 1448.081506s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34882}: linkerd_app_core::serve: Connection closed [ 1448.674284s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(289), flags: (0x5: END_HEADERS | END_STREAM) } [ 1448.674336s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1448.675502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(289), flags: (0x4: END_HEADERS) } [ 1448.675532s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(289), flags: (0x1: END_STREAM) } [ 1450.340526s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1450.340588s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1450.340598s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1453.079259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34956}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1453.079309s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34956}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34956 [ 1453.079349s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34954}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1453.079361s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34954}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:34954 [ 1453.079385s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34956}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1453.079449s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34954}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1453.079509s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34956}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58786 keepalive=None [ 1453.079523s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34956}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1453.079547s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34954}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58788 keepalive=None [ 1453.079552s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34954}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1453.081576s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34954}: linkerd_app_core::serve: Connection closed [ 1453.081622s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:34956}: linkerd_app_core::serve: Connection closed [ 1458.079443s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35034}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1458.079500s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35034}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35034 [ 1458.079522s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1458.079544s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35036}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1458.079548s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.224µs [ 1458.079566s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35036}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35036 [ 1458.079571s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1458.079593s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1458.079610s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35034}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1458.079619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: hyper::proto::h1::io: parsed 4 headers [ 1458.079622s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: hyper::proto::h1::conn: incoming body is empty [ 1458.079632s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54532 [ 1458.079714s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: hyper::proto::h1::io: flushed 106 bytes [ 1458.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35036}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1458.079773s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1458.079804s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54532}: linkerd_app_core::serve: Connection closed [ 1458.079819s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1458.079832s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.659µs [ 1458.079838s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1458.079843s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1458.079861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: hyper::proto::h1::io: parsed 4 headers [ 1458.079865s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: hyper::proto::h1::conn: incoming body is empty [ 1458.079871s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54530 [ 1458.079878s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35034}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58872 keepalive=None [ 1458.079885s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35034}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1458.079912s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35036}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58874 keepalive=None [ 1458.079929s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35036}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1458.079939s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: hyper::proto::h1::io: flushed 107 bytes [ 1458.079960s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1458.079976s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54530}: linkerd_app_core::serve: Connection closed [ 1458.081841s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35034}: linkerd_app_core::serve: Connection closed [ 1458.081894s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35036}: linkerd_app_core::serve: Connection closed [ 1458.674554s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(291), flags: (0x5: END_HEADERS | END_STREAM) } [ 1458.674607s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1458.675626s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(291), flags: (0x4: END_HEADERS) } [ 1458.675653s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(291), flags: (0x1: END_STREAM) } [ 1460.345730s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1460.345803s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1460.345813s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1463.079448s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35106}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1463.079490s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35106}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35106 [ 1463.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35104}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1463.079543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35104}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35104 [ 1463.079574s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35106}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1463.079668s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35104}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1463.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35106}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58936 keepalive=None [ 1463.079756s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35106}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1463.079781s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35104}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58938 keepalive=None [ 1463.079786s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35104}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1463.081712s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35104}: linkerd_app_core::serve: Connection closed [ 1463.081992s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35106}: linkerd_app_core::serve: Connection closed [ 1468.079708s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35180}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1468.079754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35180}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35180 [ 1468.079767s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1468.079789s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.305µs [ 1468.079798s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1468.079806s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1468.079798s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35188}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1468.079839s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35188}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35188 [ 1468.079848s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: hyper::proto::h1::io: parsed 4 headers [ 1468.079878s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: hyper::proto::h1::conn: incoming body is empty [ 1468.079892s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54674 [ 1468.079898s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35180}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1468.079992s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: hyper::proto::h1::io: flushed 107 bytes [ 1468.080002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35188}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1468.080020s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1468.080039s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54674}: linkerd_app_core::serve: Connection closed [ 1468.080053s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1468.080064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.568µs [ 1468.080070s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1468.080069s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35180}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59016 keepalive=None [ 1468.080075s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1468.080078s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35180}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1468.080088s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: hyper::proto::h1::io: parsed 4 headers [ 1468.080091s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: hyper::proto::h1::conn: incoming body is empty [ 1468.080096s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35188}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59018 keepalive=None [ 1468.080099s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35188}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1468.080096s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54676 [ 1468.080156s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: hyper::proto::h1::io: flushed 106 bytes [ 1468.080182s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1468.080196s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54676}: linkerd_app_core::serve: Connection closed [ 1468.082001s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35180}: linkerd_app_core::serve: Connection closed [ 1468.082049s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35188}: linkerd_app_core::serve: Connection closed [ 1468.675060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(293), flags: (0x5: END_HEADERS | END_STREAM) } [ 1468.675120s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1468.676073s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(293), flags: (0x4: END_HEADERS) } [ 1468.676108s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(293), flags: (0x1: END_STREAM) } [ 1470.336619s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1470.336681s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1470.336695s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1473.079946s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35252}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1473.079983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35252}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35252 [ 1473.080014s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35254}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1473.080022s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35254}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35254 [ 1473.080055s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35252}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1473.080127s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35254}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1473.080182s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35252}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59084 keepalive=None [ 1473.080188s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35252}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1473.080208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35254}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59086 keepalive=None [ 1473.080212s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35254}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1473.082074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35252}: linkerd_app_core::serve: Connection closed [ 1473.082131s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35254}: linkerd_app_core::serve: Connection closed [ 1478.079417s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35320}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1478.079450s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1478.079475s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35320}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35320 [ 1478.079492s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.933µs [ 1478.079500s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1478.079507s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1478.079519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35322}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1478.079532s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: hyper::proto::h1::io: parsed 4 headers [ 1478.079535s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: hyper::proto::h1::conn: incoming body is empty [ 1478.079533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35322}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35322 [ 1478.079544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54816 [ 1478.079569s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35320}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1478.079631s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: hyper::proto::h1::io: flushed 106 bytes [ 1478.079653s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1478.079662s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35322}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1478.079675s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54816}: linkerd_app_core::serve: Connection closed [ 1478.079686s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1478.079696s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.736µs [ 1478.079701s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1478.079706s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1478.079725s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: hyper::proto::h1::io: parsed 4 headers [ 1478.079728s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: hyper::proto::h1::conn: incoming body is empty [ 1478.079735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35320}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59158 keepalive=None [ 1478.079736s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54814 [ 1478.079746s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35320}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1478.079770s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35322}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59160 keepalive=None [ 1478.079783s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35322}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1478.079803s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: hyper::proto::h1::io: flushed 107 bytes [ 1478.079862s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1478.079889s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54814}: linkerd_app_core::serve: Connection closed [ 1478.081586s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35320}: linkerd_app_core::serve: Connection closed [ 1478.081845s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35322}: linkerd_app_core::serve: Connection closed [ 1478.674210s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(295), flags: (0x5: END_HEADERS | END_STREAM) } [ 1478.674282s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1478.675338s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(295), flags: (0x4: END_HEADERS) } [ 1478.675372s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(295), flags: (0x1: END_STREAM) } [ 1480.339761s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1480.339826s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1480.339834s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1483.079961s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35394}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1483.080012s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35394}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35394 [ 1483.080053s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35396}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1483.080065s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35396}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35396 [ 1483.080091s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35394}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1483.080166s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35396}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1483.080240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35394}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59226 keepalive=None [ 1483.080248s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35394}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1483.080279s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35396}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59228 keepalive=None [ 1483.080285s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35396}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1483.082508s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35396}: linkerd_app_core::serve: Connection closed [ 1483.082571s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35394}: linkerd_app_core::serve: Connection closed [ 1488.079393s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35474}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1488.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35474}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35474 [ 1488.079456s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1488.079485s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.768µs [ 1488.079488s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35482}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1488.079503s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1488.079504s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35482}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35482 [ 1488.079512s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1488.079532s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35474}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1488.079546s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: hyper::proto::h1::io: parsed 4 headers [ 1488.079558s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: hyper::proto::h1::conn: incoming body is empty [ 1488.079571s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54968 [ 1488.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35482}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1488.079667s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: hyper::proto::h1::io: flushed 107 bytes [ 1488.079692s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1488.079700s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35474}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59310 keepalive=None [ 1488.079710s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35474}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1488.079719s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54968}: linkerd_app_core::serve: Connection closed [ 1488.079732s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1488.079737s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35482}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59312 keepalive=None [ 1488.079761s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.789µs [ 1488.079764s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35482}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1488.079767s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1488.079774s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1488.079794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: hyper::proto::h1::io: parsed 4 headers [ 1488.079801s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: hyper::proto::h1::conn: incoming body is empty [ 1488.079808s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:54970 [ 1488.079878s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: hyper::proto::h1::io: flushed 106 bytes [ 1488.079920s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1488.079936s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:54970}: linkerd_app_core::serve: Connection closed [ 1488.081567s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35482}: linkerd_app_core::serve: Connection closed [ 1488.081695s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35474}: linkerd_app_core::serve: Connection closed [ 1488.674288s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(297), flags: (0x5: END_HEADERS | END_STREAM) } [ 1488.674342s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1488.675317s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(297), flags: (0x4: END_HEADERS) } [ 1488.675352s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(297), flags: (0x1: END_STREAM) } [ 1493.079773s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35538}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1493.079810s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35538}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35538 [ 1493.079843s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35536}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1493.079851s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35536}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35536 [ 1493.079874s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35538}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1493.079935s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35536}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1493.079993s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35538}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59368 keepalive=None [ 1493.080007s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35538}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1493.080028s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35536}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59370 keepalive=None [ 1493.080033s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35536}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1493.082026s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35536}: linkerd_app_core::serve: Connection closed [ 1493.082064s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35538}: linkerd_app_core::serve: Connection closed [ 1498.079395s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35612}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1498.079440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1498.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35612}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35612 [ 1498.079469s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.757µs [ 1498.079476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1498.079482s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1498.079491s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35610}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1498.079506s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35610}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35610 [ 1498.079509s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: hyper::proto::h1::io: parsed 4 headers [ 1498.079514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: hyper::proto::h1::conn: incoming body is empty [ 1498.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35612}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1498.079526s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55112 [ 1498.079614s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35610}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1498.079619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: hyper::proto::h1::io: flushed 107 bytes [ 1498.079678s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1498.079702s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35612}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59446 keepalive=None [ 1498.079710s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35612}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1498.079711s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55112}: linkerd_app_core::serve: Connection closed [ 1498.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1498.079732s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35610}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59448 keepalive=None [ 1498.079737s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35610}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1498.079739s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.637µs [ 1498.079745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1498.079751s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1498.079767s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: hyper::proto::h1::io: parsed 4 headers [ 1498.079770s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: hyper::proto::h1::conn: incoming body is empty [ 1498.079775s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55104 [ 1498.079837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: hyper::proto::h1::io: flushed 106 bytes [ 1498.079872s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1498.079890s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55104}: linkerd_app_core::serve: Connection closed [ 1498.081724s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35612}: linkerd_app_core::serve: Connection closed [ 1498.082178s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35610}: linkerd_app_core::serve: Connection closed [ 1498.675060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(299), flags: (0x5: END_HEADERS | END_STREAM) } [ 1498.675117s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1498.676135s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(299), flags: (0x4: END_HEADERS) } [ 1498.676167s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(299), flags: (0x1: END_STREAM) } [ 1503.078956s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35688}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1503.079002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35688}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35688 [ 1503.079036s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35690}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1503.079044s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35690}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35690 [ 1503.079067s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35688}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1503.079160s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35690}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1503.079208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35688}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59518 keepalive=None [ 1503.079234s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35688}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1503.079360s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35690}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59520 keepalive=None [ 1503.079375s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35690}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1503.081291s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35690}: linkerd_app_core::serve: Connection closed [ 1503.081340s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35688}: linkerd_app_core::serve: Connection closed [ 1508.079519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35760}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1508.079554s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1508.079573s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35760}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35760 [ 1508.079606s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.215µs [ 1508.079620s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1508.079623s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35762}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1508.079630s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1508.079632s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35762}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35762 [ 1508.079653s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35760}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1508.079661s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: hyper::proto::h1::io: parsed 4 headers [ 1508.079664s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: hyper::proto::h1::conn: incoming body is empty [ 1508.079675s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55254 [ 1508.079721s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35762}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1508.079756s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: hyper::proto::h1::io: flushed 107 bytes [ 1508.079779s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1508.079787s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35760}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59598 keepalive=None [ 1508.079796s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35760}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1508.079803s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55254}: linkerd_app_core::serve: Connection closed [ 1508.079816s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1508.079818s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35762}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59600 keepalive=None [ 1508.079861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.3µs [ 1508.079866s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1508.079871s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1508.079873s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35762}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1508.079886s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: hyper::proto::h1::io: parsed 4 headers [ 1508.079902s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: hyper::proto::h1::conn: incoming body is empty [ 1508.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55256 [ 1508.079984s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: hyper::proto::h1::io: flushed 106 bytes [ 1508.080011s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1508.080028s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55256}: linkerd_app_core::serve: Connection closed [ 1508.081603s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35760}: linkerd_app_core::serve: Connection closed [ 1508.081652s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35762}: linkerd_app_core::serve: Connection closed [ 1508.674156s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(301), flags: (0x5: END_HEADERS | END_STREAM) } [ 1508.674211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1508.675178s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(301), flags: (0x4: END_HEADERS) } [ 1508.675204s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(301), flags: (0x1: END_STREAM) } [ 1510.339405s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1510.339462s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1510.339469s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1513.079399s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35838}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1513.079439s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35838}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35838 [ 1513.079481s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35840}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1513.079500s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35840}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35840 [ 1513.079533s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35838}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1513.079626s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1513.079702s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35838}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59670 keepalive=None [ 1513.079717s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35838}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1513.079744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59672 keepalive=None [ 1513.079754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35840}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1513.081612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35840}: linkerd_app_core::serve: Connection closed [ 1513.081667s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35838}: linkerd_app_core::serve: Connection closed [ 1518.079322s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35910}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1518.079368s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35910}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35910 [ 1518.079377s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1518.079398s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.874µs [ 1518.079407s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1518.079415s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1518.079414s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35908}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1518.079426s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35908}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35908 [ 1518.079446s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: hyper::proto::h1::io: parsed 4 headers [ 1518.079452s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35910}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1518.079454s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: hyper::proto::h1::conn: incoming body is empty [ 1518.079466s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55410 [ 1518.079537s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35908}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1518.079545s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: hyper::proto::h1::io: flushed 106 bytes [ 1518.079601s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1518.079622s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35910}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59744 keepalive=None [ 1518.079633s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35910}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1518.079636s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55410}: linkerd_app_core::serve: Connection closed [ 1518.079644s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1518.079654s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35908}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59746 keepalive=None [ 1518.079658s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35908}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1518.079658s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.356µs [ 1518.079662s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1518.079667s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1518.079682s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: hyper::proto::h1::io: parsed 4 headers [ 1518.079691s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: hyper::proto::h1::conn: incoming body is empty [ 1518.079697s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55402 [ 1518.079747s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: hyper::proto::h1::io: flushed 107 bytes [ 1518.079770s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1518.079785s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55402}: linkerd_app_core::serve: Connection closed [ 1518.081487s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35908}: linkerd_app_core::serve: Connection closed [ 1518.081544s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35910}: linkerd_app_core::serve: Connection closed [ 1518.674994s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(303), flags: (0x5: END_HEADERS | END_STREAM) } [ 1518.675059s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1518.676055s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(303), flags: (0x4: END_HEADERS) } [ 1518.676084s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(303), flags: (0x1: END_STREAM) } [ 1520.339605s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1520.339665s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1520.339675s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1523.079711s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35976}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1523.079744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35976}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35976 [ 1523.079778s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35978}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1523.079785s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35978}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:35978 [ 1523.079808s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35976}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1523.079884s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35978}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1523.079940s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35976}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59808 keepalive=None [ 1523.079953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35976}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1523.079971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35978}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59810 keepalive=None [ 1523.079975s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35978}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1523.081914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35976}: linkerd_app_core::serve: Connection closed [ 1523.082108s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:35978}: linkerd_app_core::serve: Connection closed [ 1528.079224s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36048}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1528.079273s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36048}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36048 [ 1528.079301s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1528.079325s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.947µs [ 1528.079321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36056}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1528.079333s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1528.079332s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36056}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36056 [ 1528.079340s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1528.079360s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36048}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1528.079370s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: hyper::proto::h1::io: parsed 4 headers [ 1528.079374s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: hyper::proto::h1::conn: incoming body is empty [ 1528.079385s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55542 [ 1528.079450s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36056}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1528.079461s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: hyper::proto::h1::io: flushed 106 bytes [ 1528.079480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1528.079497s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55542}: linkerd_app_core::serve: Connection closed [ 1528.079502s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36048}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59884 keepalive=None [ 1528.079508s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1528.079508s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36048}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1528.079518s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.847µs [ 1528.079522s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1528.079526s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1528.079527s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36056}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59886 keepalive=None [ 1528.079530s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36056}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1528.079539s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: hyper::proto::h1::io: parsed 4 headers [ 1528.079541s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: hyper::proto::h1::conn: incoming body is empty [ 1528.079547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55544 [ 1528.079591s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: hyper::proto::h1::io: flushed 107 bytes [ 1528.079609s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1528.079624s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55544}: linkerd_app_core::serve: Connection closed [ 1528.081358s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36056}: linkerd_app_core::serve: Connection closed [ 1528.081638s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36048}: linkerd_app_core::serve: Connection closed [ 1528.674466s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(305), flags: (0x5: END_HEADERS | END_STREAM) } [ 1528.674516s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1528.675509s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(305), flags: (0x4: END_HEADERS) } [ 1528.675535s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(305), flags: (0x1: END_STREAM) } [ 1533.079122s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36116}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1533.079174s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36116}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36116 [ 1533.079208s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36118}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1533.079215s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36118}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36118 [ 1533.079240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36116}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1533.079308s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36118}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1533.079366s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36116}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59948 keepalive=None [ 1533.079375s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36116}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1533.079395s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36118}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:59950 keepalive=None [ 1533.079408s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36118}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1533.081191s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36116}: linkerd_app_core::serve: Connection closed [ 1533.081283s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36118}: linkerd_app_core::serve: Connection closed [ 1538.079880s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36192}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1538.079913s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1538.079939s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36192}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36192 [ 1538.079962s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.655µs [ 1538.079973s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1538.079981s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1538.079983s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36190}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1538.079992s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36190}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36190 [ 1538.080013s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36192}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1538.080019s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: hyper::proto::h1::io: parsed 4 headers [ 1538.080032s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: hyper::proto::h1::conn: incoming body is empty [ 1538.080046s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55686 [ 1538.080074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36190}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1538.080127s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36192}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60028 keepalive=None [ 1538.080134s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36192}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1538.080134s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: hyper::proto::h1::io: flushed 106 bytes [ 1538.080152s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36190}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60030 keepalive=None [ 1538.080159s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36190}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1538.080161s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1538.080182s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55686}: linkerd_app_core::serve: Connection closed [ 1538.080194s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1538.080206s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.629µs [ 1538.080212s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1538.080218s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1538.080234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: hyper::proto::h1::io: parsed 4 headers [ 1538.080237s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: hyper::proto::h1::conn: incoming body is empty [ 1538.080244s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55684 [ 1538.080303s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: hyper::proto::h1::io: flushed 107 bytes [ 1538.080329s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1538.080342s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55684}: linkerd_app_core::serve: Connection closed [ 1538.081951s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36190}: linkerd_app_core::serve: Connection closed [ 1538.081989s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36192}: linkerd_app_core::serve: Connection closed [ 1538.675067s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(307), flags: (0x5: END_HEADERS | END_STREAM) } [ 1538.675145s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1538.676064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(307), flags: (0x4: END_HEADERS) } [ 1538.676096s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(307), flags: (0x1: END_STREAM) } [ 1543.079657s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36268}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1543.079698s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36268}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36268 [ 1543.079734s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36266}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1543.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36266}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36266 [ 1543.079767s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36268}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1543.079842s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36266}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1543.079928s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36268}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60098 keepalive=None [ 1543.079953s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36268}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1543.079982s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36266}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60100 keepalive=None [ 1543.079987s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36266}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1543.081866s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36266}: linkerd_app_core::serve: Connection closed [ 1543.081938s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36268}: linkerd_app_core::serve: Connection closed [ 1548.078949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36342}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1548.079005s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36342}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36342 [ 1548.079052s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36344}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1548.079068s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36344}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36344 [ 1548.079097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1548.079231s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36344}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1548.079325s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60176 keepalive=None [ 1548.079341s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36342}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1548.079369s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36344}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60178 keepalive=None [ 1548.079374s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36344}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1548.079399s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1548.079423s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.835µs [ 1548.079440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1548.079448s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1548.079480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: hyper::proto::h1::io: parsed 4 headers [ 1548.079485s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: hyper::proto::h1::conn: incoming body is empty [ 1548.079498s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55840 [ 1548.079590s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: hyper::proto::h1::io: flushed 106 bytes [ 1548.079616s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1548.079636s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55840}: linkerd_app_core::serve: Connection closed [ 1548.079644s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1548.079650s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=2.775µs [ 1548.079653s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1548.079656s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1548.079666s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: hyper::proto::h1::io: parsed 4 headers [ 1548.079668s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: hyper::proto::h1::conn: incoming body is empty [ 1548.079672s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55842 [ 1548.079712s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: hyper::proto::h1::io: flushed 107 bytes [ 1548.079731s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1548.079745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55842}: linkerd_app_core::serve: Connection closed [ 1548.081209s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36342}: linkerd_app_core::serve: Connection closed [ 1548.081253s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36344}: linkerd_app_core::serve: Connection closed [ 1548.674260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(309), flags: (0x5: END_HEADERS | END_STREAM) } [ 1548.674313s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1548.675297s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(309), flags: (0x4: END_HEADERS) } [ 1548.675324s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(309), flags: (0x1: END_STREAM) } [ 1553.079806s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36410}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1553.079844s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36410}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36410 [ 1553.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36408}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1553.079904s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36408}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36408 [ 1553.079936s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36410}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1553.080016s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36408}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1553.080083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36410}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60238 keepalive=None [ 1553.080095s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36410}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1553.080118s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36408}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60240 keepalive=None [ 1553.080128s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36408}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1553.081966s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36410}: linkerd_app_core::serve: Connection closed [ 1553.082025s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36408}: linkerd_app_core::serve: Connection closed [ 1558.079944s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36478}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1558.079990s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1558.079993s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36478}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36478 [ 1558.080018s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.447µs [ 1558.080030s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1558.080041s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1558.080044s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36486}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1558.080059s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36486}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36486 [ 1558.080078s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: hyper::proto::h1::io: parsed 4 headers [ 1558.080082s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: hyper::proto::h1::conn: incoming body is empty [ 1558.080093s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55972 [ 1558.080102s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36478}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1558.080199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: hyper::proto::h1::io: flushed 107 bytes [ 1558.080230s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36486}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1558.080247s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1558.080290s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55972}: linkerd_app_core::serve: Connection closed [ 1558.080299s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36478}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60314 keepalive=None [ 1558.080307s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36478}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1558.080311s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1558.080324s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.05µs [ 1558.080353s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1558.080330s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36486}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60316 keepalive=None [ 1558.080362s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1558.080362s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36486}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1558.080379s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: hyper::proto::h1::io: parsed 4 headers [ 1558.080385s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: hyper::proto::h1::conn: incoming body is empty [ 1558.080391s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:55974 [ 1558.080473s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: hyper::proto::h1::io: flushed 106 bytes [ 1558.080512s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1558.080534s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:55974}: linkerd_app_core::serve: Connection closed [ 1558.082151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36486}: linkerd_app_core::serve: Connection closed [ 1558.082205s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36478}: linkerd_app_core::serve: Connection closed [ 1558.674390s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(311), flags: (0x5: END_HEADERS | END_STREAM) } [ 1558.674440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1558.675471s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(311), flags: (0x4: END_HEADERS) } [ 1558.675502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(311), flags: (0x1: END_STREAM) } [ 1563.079382s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36558}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1563.079421s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36558}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36558 [ 1563.079465s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36556}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1563.079484s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36556}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36556 [ 1563.079523s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1563.079624s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36556}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1563.079693s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60388 keepalive=None [ 1563.079703s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36558}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1563.079725s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36556}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60390 keepalive=None [ 1563.079731s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36556}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1563.081582s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36558}: linkerd_app_core::serve: Connection closed [ 1563.081627s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36556}: linkerd_app_core::serve: Connection closed [ 1568.079806s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36628}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1568.079846s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1568.079868s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36628}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36628 [ 1568.079890s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.738µs [ 1568.079899s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1568.079907s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1568.079907s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36630}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1568.079916s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36630}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36630 [ 1568.079938s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36628}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1568.079938s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: hyper::proto::h1::io: parsed 4 headers [ 1568.079959s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: hyper::proto::h1::conn: incoming body is empty [ 1568.079980s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56122 [ 1568.080024s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36630}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1568.080072s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: hyper::proto::h1::io: flushed 107 bytes [ 1568.080097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36628}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60464 keepalive=None [ 1568.080117s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36628}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1568.080099s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1568.080147s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36630}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60466 keepalive=None [ 1568.080152s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36630}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1568.080153s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56122}: linkerd_app_core::serve: Connection closed [ 1568.080190s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1568.080202s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.867µs [ 1568.080208s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1568.080213s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1568.080230s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: hyper::proto::h1::io: parsed 4 headers [ 1568.080233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: hyper::proto::h1::conn: incoming body is empty [ 1568.080239s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56130 [ 1568.080323s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: hyper::proto::h1::io: flushed 106 bytes [ 1568.080355s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1568.080375s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56130}: linkerd_app_core::serve: Connection closed [ 1568.081924s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36628}: linkerd_app_core::serve: Connection closed [ 1568.081972s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36630}: linkerd_app_core::serve: Connection closed [ 1568.674512s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(313), flags: (0x5: END_HEADERS | END_STREAM) } [ 1568.674571s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1568.675473s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(313), flags: (0x4: END_HEADERS) } [ 1568.675498s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(313), flags: (0x1: END_STREAM) } [ 1570.340235s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1570.340296s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1570.340315s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1573.079260s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36702}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1573.079294s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36702}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36702 [ 1573.079329s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36704}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1573.079336s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36704}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36704 [ 1573.079373s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36702}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1573.079472s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36704}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1573.079521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36702}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60534 keepalive=None [ 1573.079528s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36702}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1573.079545s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36704}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60536 keepalive=None [ 1573.079549s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36704}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1573.081432s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36702}: linkerd_app_core::serve: Connection closed [ 1573.081490s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36704}: linkerd_app_core::serve: Connection closed [ 1578.079047s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36782}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1578.079091s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36782}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36782 [ 1578.079109s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1578.079147s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.936µs [ 1578.079156s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1578.079163s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1578.079156s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36788}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1578.079169s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36788}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36788 [ 1578.079191s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: hyper::proto::h1::io: parsed 4 headers [ 1578.079208s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: hyper::proto::h1::conn: incoming body is empty [ 1578.079196s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36782}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1578.079221s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56278 [ 1578.079293s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36788}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1578.079298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: hyper::proto::h1::io: flushed 106 bytes [ 1578.079340s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1578.079365s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56278}: linkerd_app_core::serve: Connection closed [ 1578.079366s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36782}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60616 keepalive=None [ 1578.079371s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36782}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1578.079374s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1578.079386s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.056µs [ 1578.079390s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1578.079391s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36788}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60618 keepalive=None [ 1578.079395s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1578.079394s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36788}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1578.079409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: hyper::proto::h1::io: parsed 4 headers [ 1578.079413s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: hyper::proto::h1::conn: incoming body is empty [ 1578.079418s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56280 [ 1578.079494s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: hyper::proto::h1::io: flushed 107 bytes [ 1578.079516s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1578.079532s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56280}: linkerd_app_core::serve: Connection closed [ 1578.081307s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36782}: linkerd_app_core::serve: Connection closed [ 1578.081351s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36788}: linkerd_app_core::serve: Connection closed [ 1578.674311s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(315), flags: (0x5: END_HEADERS | END_STREAM) } [ 1578.674361s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1578.675195s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(315), flags: (0x4: END_HEADERS) } [ 1578.675221s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(315), flags: (0x1: END_STREAM) } [ 1580.341150s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1580.341208s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1580.341222s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1583.079405s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36850}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1583.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36850}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36850 [ 1583.079471s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36848}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1583.079488s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36848}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36848 [ 1583.079521s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36850}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1583.079603s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36848}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1583.079662s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36850}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60680 keepalive=None [ 1583.079673s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36850}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1583.079693s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36848}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60682 keepalive=None [ 1583.079704s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36848}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1583.081625s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36848}: linkerd_app_core::serve: Connection closed [ 1583.081669s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36850}: linkerd_app_core::serve: Connection closed [ 1588.079389s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36922}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1588.079441s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1588.079436s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36922}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36922 [ 1588.079466s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.696µs [ 1588.079476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1588.079484s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1588.079479s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36920}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1588.079491s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36920}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36920 [ 1588.079514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: hyper::proto::h1::io: parsed 4 headers [ 1588.079526s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: hyper::proto::h1::conn: incoming body is empty [ 1588.079529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36922}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1588.079537s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56420 [ 1588.079610s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: hyper::proto::h1::io: flushed 106 bytes [ 1588.079612s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36920}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1588.079656s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1588.079681s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56420}: linkerd_app_core::serve: Connection closed [ 1588.079695s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1588.079705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.857µs [ 1588.079711s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1588.079716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1588.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36922}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60756 keepalive=None [ 1588.079726s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36922}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1588.079745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: hyper::proto::h1::io: parsed 4 headers [ 1588.079749s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: hyper::proto::h1::conn: incoming body is empty [ 1588.079750s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36920}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60758 keepalive=None [ 1588.079753s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36920}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1588.079755s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56422 [ 1588.079822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: hyper::proto::h1::io: flushed 107 bytes [ 1588.079846s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1588.079862s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56422}: linkerd_app_core::serve: Connection closed [ 1588.081480s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36920}: linkerd_app_core::serve: Connection closed [ 1588.081529s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36922}: linkerd_app_core::serve: Connection closed [ 1588.675169s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(317), flags: (0x5: END_HEADERS | END_STREAM) } [ 1588.675221s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1588.676056s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(317), flags: (0x4: END_HEADERS) } [ 1588.676084s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(317), flags: (0x1: END_STREAM) } [ 1590.337373s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1590.337431s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1590.337451s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1593.079211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36992}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1593.079245s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36992}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36992 [ 1593.079281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36994}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1593.079289s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36994}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:36994 [ 1593.079317s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36992}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1593.079399s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1593.079473s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36992}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60824 keepalive=None [ 1593.079487s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36992}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1593.079511s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60826 keepalive=None [ 1593.079515s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36994}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1593.081245s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36994}: linkerd_app_core::serve: Connection closed [ 1593.081368s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:36992}: linkerd_app_core::serve: Connection closed [ 1598.079241s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37062}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1598.079282s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1598.079292s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37062}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37062 [ 1598.079307s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.873µs [ 1598.079315s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1598.079321s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1598.079339s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37068}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1598.079346s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: hyper::proto::h1::io: parsed 4 headers [ 1598.079373s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: hyper::proto::h1::conn: incoming body is empty [ 1598.079357s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37068}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37068 [ 1598.079383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56556 [ 1598.079409s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37062}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1598.079457s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: hyper::proto::h1::io: flushed 107 bytes [ 1598.079482s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1598.079514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56556}: linkerd_app_core::serve: Connection closed [ 1598.079543s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1598.079515s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37068}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1598.079565s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.608µs [ 1598.079599s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1598.079603s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1598.079617s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: hyper::proto::h1::io: parsed 4 headers [ 1598.079623s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: hyper::proto::h1::conn: incoming body is empty [ 1598.079629s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56560 [ 1598.079642s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37062}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60896 keepalive=None [ 1598.079660s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37062}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1598.079680s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37068}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60898 keepalive=None [ 1598.079684s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37068}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1598.079695s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: hyper::proto::h1::io: flushed 106 bytes [ 1598.079721s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1598.079739s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56560}: linkerd_app_core::serve: Connection closed [ 1598.081504s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37068}: linkerd_app_core::serve: Connection closed [ 1598.081557s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37062}: linkerd_app_core::serve: Connection closed [ 1598.674505s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(319), flags: (0x5: END_HEADERS | END_STREAM) } [ 1598.674565s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1598.675466s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(319), flags: (0x4: END_HEADERS) } [ 1598.675498s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(319), flags: (0x1: END_STREAM) } [ 1600.337483s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1600.337544s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1600.337556s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1603.079151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37132}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1603.079189s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37132}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37132 [ 1603.079235s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37130}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1603.079247s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37130}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37130 [ 1603.079282s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37132}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1603.079385s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37130}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1603.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37132}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60962 keepalive=None [ 1603.079472s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37132}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1603.079494s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37130}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:60964 keepalive=None [ 1603.079499s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37130}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1603.081329s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37132}: linkerd_app_core::serve: Connection closed [ 1603.081562s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37130}: linkerd_app_core::serve: Connection closed [ 1608.079590s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37210}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1608.079627s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1608.079649s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37210}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37210 [ 1608.079688s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=23.274µs [ 1608.079705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1608.079713s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1608.079708s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37208}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1608.079731s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37208}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37208 [ 1608.079739s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: hyper::proto::h1::io: parsed 4 headers [ 1608.079742s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: hyper::proto::h1::conn: incoming body is empty [ 1608.079755s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56702 [ 1608.079767s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37210}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1608.079847s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: hyper::proto::h1::io: flushed 107 bytes [ 1608.079864s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37208}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1608.079896s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1608.079921s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56702}: linkerd_app_core::serve: Connection closed [ 1608.079933s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1608.079933s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37210}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:32812 keepalive=None [ 1608.079941s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37210}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1608.079944s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.468µs [ 1608.079950s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1608.079956s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1608.079963s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37208}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:32814 keepalive=None [ 1608.079967s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37208}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1608.079971s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: hyper::proto::h1::io: parsed 4 headers [ 1608.079974s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: hyper::proto::h1::conn: incoming body is empty [ 1608.079981s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56710 [ 1608.080039s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: hyper::proto::h1::io: flushed 106 bytes [ 1608.080064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1608.080088s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56710}: linkerd_app_core::serve: Connection closed [ 1608.081747s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37210}: linkerd_app_core::serve: Connection closed [ 1608.081793s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37208}: linkerd_app_core::serve: Connection closed [ 1608.674146s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(321), flags: (0x5: END_HEADERS | END_STREAM) } [ 1608.674196s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1608.675199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(321), flags: (0x4: END_HEADERS) } [ 1608.675229s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(321), flags: (0x1: END_STREAM) } [ 1613.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37274}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1613.079764s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37274}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37274 [ 1613.079810s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37276}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1613.079824s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37276}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37276 [ 1613.079863s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37274}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1613.079955s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37276}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1613.080037s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37274}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:32874 keepalive=None [ 1613.080050s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37274}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1613.080068s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37276}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:32876 keepalive=None [ 1613.080071s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37276}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1613.082014s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37276}: linkerd_app_core::serve: Connection closed [ 1613.082055s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37274}: linkerd_app_core::serve: Connection closed [ 1618.079395s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37342}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1618.079433s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1618.079443s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37342}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37342 [ 1618.079465s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.41µs [ 1618.079477s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1618.079485s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1618.079488s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37344}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1618.079508s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37344}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37344 [ 1618.079517s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: hyper::proto::h1::io: parsed 4 headers [ 1618.079538s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: hyper::proto::h1::conn: incoming body is empty [ 1618.079545s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1618.079549s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56836 [ 1618.079657s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37344}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1618.079683s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: hyper::proto::h1::io: flushed 106 bytes [ 1618.079718s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1618.079746s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56836}: linkerd_app_core::serve: Connection closed [ 1618.079765s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1618.079780s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.042µs [ 1618.079789s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37342}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:32948 keepalive=None [ 1618.079812s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37342}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1618.079794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1618.079854s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1618.079871s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37344}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:32950 keepalive=None [ 1618.079881s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37344}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1618.079895s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: hyper::proto::h1::io: parsed 4 headers [ 1618.079900s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: hyper::proto::h1::conn: incoming body is empty [ 1618.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56838 [ 1618.079970s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: hyper::proto::h1::io: flushed 107 bytes [ 1618.079988s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1618.080005s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56838}: linkerd_app_core::serve: Connection closed [ 1618.081895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37344}: linkerd_app_core::serve: Connection closed [ 1618.081945s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37342}: linkerd_app_core::serve: Connection closed [ 1618.674646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(323), flags: (0x5: END_HEADERS | END_STREAM) } [ 1618.674706s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1618.675675s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(323), flags: (0x4: END_HEADERS) } [ 1618.675702s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(323), flags: (0x1: END_STREAM) } [ 1623.079011s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37420}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1623.079047s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37420}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37420 [ 1623.079093s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37422}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1623.079112s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37422}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37422 [ 1623.079167s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37420}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1623.079262s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1623.079321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37420}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33018 keepalive=None [ 1623.079327s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37420}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1623.079349s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33020 keepalive=None [ 1623.079357s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37422}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1623.081267s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37422}: linkerd_app_core::serve: Connection closed [ 1623.081306s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37420}: linkerd_app_core::serve: Connection closed [ 1628.079520s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37496}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1628.079549s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1628.079584s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37496}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37496 [ 1628.079603s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.274µs [ 1628.079618s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1628.079625s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1628.079634s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37490}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1628.079655s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: hyper::proto::h1::io: parsed 4 headers [ 1628.079659s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: hyper::proto::h1::conn: incoming body is empty [ 1628.079656s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37490}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37490 [ 1628.079668s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56984 [ 1628.079692s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37496}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1628.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: hyper::proto::h1::io: flushed 106 bytes [ 1628.079764s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1628.079782s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56984}: linkerd_app_core::serve: Connection closed [ 1628.079780s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37490}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1628.079799s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1628.079810s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.237µs [ 1628.079814s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1628.079818s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1628.079832s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: hyper::proto::h1::io: parsed 4 headers [ 1628.079835s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: hyper::proto::h1::conn: incoming body is empty [ 1628.079842s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:56986 [ 1628.079857s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37496}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33092 keepalive=None [ 1628.079867s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37496}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1628.079888s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37490}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33094 keepalive=None [ 1628.079893s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37490}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1628.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: hyper::proto::h1::io: flushed 107 bytes [ 1628.079935s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1628.079948s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:56986}: linkerd_app_core::serve: Connection closed [ 1628.081848s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37496}: linkerd_app_core::serve: Connection closed [ 1628.081884s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37490}: linkerd_app_core::serve: Connection closed [ 1628.674336s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(325), flags: (0x5: END_HEADERS | END_STREAM) } [ 1628.674392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1628.675432s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(325), flags: (0x4: END_HEADERS) } [ 1628.675459s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(325), flags: (0x1: END_STREAM) } [ 1630.346193s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1630.346281s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1630.346293s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1633.079859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37562}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1633.079912s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37562}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37562 [ 1633.079964s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37564}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1633.079977s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37564}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37564 [ 1633.080005s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37562}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1633.080100s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37564}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1633.080176s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37562}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33162 keepalive=None [ 1633.080189s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37562}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1633.080216s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37564}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33164 keepalive=None [ 1633.080225s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37564}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1633.081945s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37562}: linkerd_app_core::serve: Connection closed [ 1633.081999s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37564}: linkerd_app_core::serve: Connection closed [ 1638.079168s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37638}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1638.079214s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37638}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37638 [ 1638.079242s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1638.079274s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.664µs [ 1638.079275s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37640}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1638.079293s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1638.079295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37640}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37640 [ 1638.079300s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1638.079361s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37638}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1638.079380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: hyper::proto::h1::io: parsed 4 headers [ 1638.079394s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: hyper::proto::h1::conn: incoming body is empty [ 1638.079407s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57140 [ 1638.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37640}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1638.079501s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: hyper::proto::h1::io: flushed 106 bytes [ 1638.079533s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1638.079543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37638}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33242 keepalive=None [ 1638.079554s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37638}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1638.079559s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57140}: linkerd_app_core::serve: Connection closed [ 1638.079598s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37640}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33244 keepalive=None [ 1638.079605s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37640}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1638.079605s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1638.079620s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.371µs [ 1638.079629s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1638.079637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1638.079657s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: hyper::proto::h1::io: parsed 4 headers [ 1638.079665s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: hyper::proto::h1::conn: incoming body is empty [ 1638.079673s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57132 [ 1638.079744s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: hyper::proto::h1::io: flushed 107 bytes [ 1638.079768s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1638.079782s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57132}: linkerd_app_core::serve: Connection closed [ 1638.081295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37640}: linkerd_app_core::serve: Connection closed [ 1638.081343s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37638}: linkerd_app_core::serve: Connection closed [ 1638.674631s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(327), flags: (0x5: END_HEADERS | END_STREAM) } [ 1638.674687s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1638.675631s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(327), flags: (0x4: END_HEADERS) } [ 1638.675659s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(327), flags: (0x1: END_STREAM) } [ 1640.362933s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1640.362989s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1640.362996s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1643.079113s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37706}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1643.079168s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37706}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37706 [ 1643.079206s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37708}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1643.079221s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37708}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37708 [ 1643.079246s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37706}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1643.079333s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37708}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1643.079388s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37706}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33306 keepalive=None [ 1643.079396s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37706}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1643.079416s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37708}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33308 keepalive=None [ 1643.079420s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37708}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1643.081167s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37708}: linkerd_app_core::serve: Connection closed [ 1643.081311s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37706}: linkerd_app_core::serve: Connection closed [ 1648.079099s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37768}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1648.079162s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1648.079161s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37768}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37768 [ 1648.079190s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.845µs [ 1648.079198s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1648.079205s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1648.079203s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37772}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1648.079218s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37772}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37772 [ 1648.079233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: hyper::proto::h1::io: parsed 4 headers [ 1648.079244s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: hyper::proto::h1::conn: incoming body is empty [ 1648.079246s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37768}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1648.079254s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57262 [ 1648.079315s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37772}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1648.079338s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: hyper::proto::h1::io: flushed 106 bytes [ 1648.079361s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1648.079377s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37768}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33370 keepalive=None [ 1648.079382s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57262}: linkerd_app_core::serve: Connection closed [ 1648.079385s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37768}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1648.079396s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1648.079409s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.18µs [ 1648.079412s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37772}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33372 keepalive=None [ 1648.079415s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1648.079418s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37772}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1648.079422s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1648.079439s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: hyper::proto::h1::io: parsed 4 headers [ 1648.079443s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: hyper::proto::h1::conn: incoming body is empty [ 1648.079448s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57268 [ 1648.079506s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: hyper::proto::h1::io: flushed 107 bytes [ 1648.079536s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1648.079553s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57268}: linkerd_app_core::serve: Connection closed [ 1648.081329s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37768}: linkerd_app_core::serve: Connection closed [ 1648.081380s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37772}: linkerd_app_core::serve: Connection closed [ 1648.674429s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(329), flags: (0x5: END_HEADERS | END_STREAM) } [ 1648.674486s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1648.675318s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(329), flags: (0x4: END_HEADERS) } [ 1648.675350s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(329), flags: (0x1: END_STREAM) } [ 1648.675615s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=WindowUpdate { stream_id: StreamId(0), size_increment: 350810 } [ 1653.079777s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37834}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1653.079813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37834}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37834 [ 1653.079848s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37836}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1653.079860s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37836}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37836 [ 1653.079891s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37834}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1653.079976s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37836}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1653.080054s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37834}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33434 keepalive=None [ 1653.080068s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37834}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1653.080091s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37836}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33436 keepalive=None [ 1653.080103s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37836}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1653.081856s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37834}: linkerd_app_core::serve: Connection closed [ 1653.082070s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37836}: linkerd_app_core::serve: Connection closed [ 1658.079776s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37898}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1658.079806s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1658.079828s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37898}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37898 [ 1658.079852s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.847µs [ 1658.079860s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1658.079866s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1658.079869s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37900}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1658.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37900}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37900 [ 1658.079891s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: hyper::proto::h1::io: parsed 4 headers [ 1658.079911s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: hyper::proto::h1::conn: incoming body is empty [ 1658.079924s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37898}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1658.079921s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57392 [ 1658.080001s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: hyper::proto::h1::io: flushed 106 bytes [ 1658.080022s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37900}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1658.080031s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1658.080049s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57392}: linkerd_app_core::serve: Connection closed [ 1658.080063s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1658.080075s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.759µs [ 1658.080087s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37898}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33500 keepalive=None [ 1658.080097s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37898}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1658.080132s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37900}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33502 keepalive=None [ 1658.080136s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37900}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1658.080092s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1658.080143s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1658.080157s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: hyper::proto::h1::io: parsed 4 headers [ 1658.080159s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: hyper::proto::h1::conn: incoming body is empty [ 1658.080163s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57398 [ 1658.080207s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: hyper::proto::h1::io: flushed 107 bytes [ 1658.080223s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1658.080238s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57398}: linkerd_app_core::serve: Connection closed [ 1658.081735s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37900}: linkerd_app_core::serve: Connection closed [ 1658.081783s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37898}: linkerd_app_core::serve: Connection closed [ 1658.674106s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(331), flags: (0x5: END_HEADERS | END_STREAM) } [ 1658.674162s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1658.675201s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(331), flags: (0x4: END_HEADERS) } [ 1658.675236s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(331), flags: (0x1: END_STREAM) } [ 1663.079861s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37966}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1663.079915s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37966}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37966 [ 1663.079957s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37968}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1663.079971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37968}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:37968 [ 1663.079999s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37966}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1663.080095s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37968}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1663.080185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37966}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33564 keepalive=None [ 1663.080218s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37966}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1663.080250s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37968}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33566 keepalive=None [ 1663.080259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37968}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1663.082069s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37968}: linkerd_app_core::serve: Connection closed [ 1663.082462s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:37966}: linkerd_app_core::serve: Connection closed [ 1668.079736s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38040}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1668.079773s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1668.079787s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38040}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38040 [ 1668.079803s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.346µs [ 1668.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1668.079818s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1668.079835s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38048}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1668.079854s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38048}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38048 [ 1668.079842s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: hyper::proto::h1::io: parsed 4 headers [ 1668.079862s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: hyper::proto::h1::conn: incoming body is empty [ 1668.079873s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57536 [ 1668.079879s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38040}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1668.079954s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: hyper::proto::h1::io: flushed 107 bytes [ 1668.079987s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1668.079992s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38048}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1668.080008s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57536}: linkerd_app_core::serve: Connection closed [ 1668.080027s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1668.080038s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.699µs [ 1668.080044s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1668.080050s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1668.080065s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: hyper::proto::h1::io: parsed 4 headers [ 1668.080068s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: hyper::proto::h1::conn: incoming body is empty [ 1668.080067s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38040}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33644 keepalive=None [ 1668.080074s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38040}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1668.080074s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57534 [ 1668.080120s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38048}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33646 keepalive=None [ 1668.080132s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38048}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1668.080155s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: hyper::proto::h1::io: flushed 106 bytes [ 1668.080174s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1668.080189s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57534}: linkerd_app_core::serve: Connection closed [ 1668.081703s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38048}: linkerd_app_core::serve: Connection closed [ 1668.081744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38040}: linkerd_app_core::serve: Connection closed [ 1668.674129s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(333), flags: (0x5: END_HEADERS | END_STREAM) } [ 1668.674186s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1668.675178s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(333), flags: (0x4: END_HEADERS) } [ 1668.675206s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(333), flags: (0x1: END_STREAM) } [ 1670.341019s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1670.341086s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1670.341096s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1673.079351s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38108}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1673.079397s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38108}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38108 [ 1673.079440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38110}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1673.079453s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38110}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38110 [ 1673.079476s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38108}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1673.079548s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38110}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1673.079608s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38108}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33708 keepalive=None [ 1673.079617s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38108}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1673.079632s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38110}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33710 keepalive=None [ 1673.079635s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38110}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1673.081394s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38110}: linkerd_app_core::serve: Connection closed [ 1673.081440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38108}: linkerd_app_core::serve: Connection closed [ 1678.079484s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38178}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1678.079516s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1678.079538s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38178}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38178 [ 1678.079580s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=11.711µs [ 1678.079593s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1678.079610s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1678.079603s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38180}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1678.079647s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38180}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38180 [ 1678.079660s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: hyper::proto::h1::io: parsed 4 headers [ 1678.079667s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: hyper::proto::h1::conn: incoming body is empty [ 1678.079683s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38178}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1678.079681s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57672 [ 1678.079760s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38180}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1678.079770s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: hyper::proto::h1::io: flushed 107 bytes [ 1678.079795s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1678.079818s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57672}: linkerd_app_core::serve: Connection closed [ 1678.079819s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38178}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33784 keepalive=None [ 1678.079826s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38178}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1678.079835s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1678.079847s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38180}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33786 keepalive=None [ 1678.079851s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38180}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1678.079847s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.638µs [ 1678.079858s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1678.079865s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1678.079883s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: hyper::proto::h1::io: parsed 4 headers [ 1678.079886s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: hyper::proto::h1::conn: incoming body is empty [ 1678.079893s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57674 [ 1678.079955s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: hyper::proto::h1::io: flushed 106 bytes [ 1678.079970s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1678.079988s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57674}: linkerd_app_core::serve: Connection closed [ 1678.081789s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38178}: linkerd_app_core::serve: Connection closed [ 1678.081838s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38180}: linkerd_app_core::serve: Connection closed [ 1678.674817s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(335), flags: (0x5: END_HEADERS | END_STREAM) } [ 1678.674870s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1678.675852s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(335), flags: (0x4: END_HEADERS) } [ 1678.675883s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(335), flags: (0x1: END_STREAM) } [ 1683.079164s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38260}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1683.079205s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38260}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38260 [ 1683.079240s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38258}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1683.079251s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38258}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38258 [ 1683.079283s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38260}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1683.079370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38258}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1683.079442s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38260}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33858 keepalive=None [ 1683.079452s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38260}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1683.079485s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38258}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33860 keepalive=None [ 1683.079495s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38258}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1683.081170s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38260}: linkerd_app_core::serve: Connection closed [ 1683.081370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38258}: linkerd_app_core::serve: Connection closed [ 1688.079917s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38332}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1688.079967s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38332}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38332 [ 1688.079995s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1688.080027s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.287µs [ 1688.080023s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38330}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1688.080052s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1688.080076s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1688.080061s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38330}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38330 [ 1688.080111s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: hyper::proto::h1::io: parsed 4 headers [ 1688.080118s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: hyper::proto::h1::conn: incoming body is empty [ 1688.080125s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38332}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1688.080129s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57830 [ 1688.080219s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: hyper::proto::h1::io: flushed 106 bytes [ 1688.080224s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38330}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1688.080248s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1688.080279s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57830}: linkerd_app_core::serve: Connection closed [ 1688.080295s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1688.080302s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38332}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33934 keepalive=None [ 1688.080311s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38332}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1688.080313s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.039µs [ 1688.080359s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38330}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:33936 keepalive=None [ 1688.080374s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38330}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1688.080358s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1688.080383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1688.080404s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: hyper::proto::h1::io: parsed 4 headers [ 1688.080408s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: hyper::proto::h1::conn: incoming body is empty [ 1688.080415s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57832 [ 1688.080489s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: hyper::proto::h1::io: flushed 107 bytes [ 1688.080512s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1688.080526s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57832}: linkerd_app_core::serve: Connection closed [ 1688.082000s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38332}: linkerd_app_core::serve: Connection closed [ 1688.082050s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38330}: linkerd_app_core::serve: Connection closed [ 1688.674511s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(337), flags: (0x5: END_HEADERS | END_STREAM) } [ 1688.674588s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1688.675617s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(337), flags: (0x4: END_HEADERS) } [ 1688.675652s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(337), flags: (0x1: END_STREAM) } [ 1690.337831s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1690.337892s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1690.337901s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1693.079271s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38408}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1693.079317s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38408}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38408 [ 1693.079363s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38410}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1693.079376s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38410}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38410 [ 1693.079405s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38408}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1693.079492s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38410}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1693.079543s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38408}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34008 keepalive=None [ 1693.079549s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38408}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1693.079569s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38410}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34010 keepalive=None [ 1693.079573s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38410}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1693.081456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38408}: linkerd_app_core::serve: Connection closed [ 1693.081504s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38410}: linkerd_app_core::serve: Connection closed [ 1698.079219s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38484}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1698.079260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1698.079272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38484}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38484 [ 1698.079289s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.187µs [ 1698.079300s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1698.079306s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1698.079331s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: hyper::proto::h1::io: parsed 4 headers [ 1698.079351s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: hyper::proto::h1::conn: incoming body is empty [ 1698.079327s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38490}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1698.079360s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38490}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38490 [ 1698.079363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57978 [ 1698.079401s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38484}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1698.079448s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: hyper::proto::h1::io: flushed 106 bytes [ 1698.079477s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1698.079502s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38490}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1698.079514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57978}: linkerd_app_core::serve: Connection closed [ 1698.079563s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1698.079579s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.44µs [ 1698.079593s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1698.079607s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38484}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34086 keepalive=None [ 1698.079614s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1698.079614s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38484}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1698.079632s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: hyper::proto::h1::io: parsed 4 headers [ 1698.079637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: hyper::proto::h1::conn: incoming body is empty [ 1698.079637s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38490}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34088 keepalive=None [ 1698.079641s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38490}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1698.079644s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:57982 [ 1698.079704s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: hyper::proto::h1::io: flushed 107 bytes [ 1698.079720s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1698.079734s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:57982}: linkerd_app_core::serve: Connection closed [ 1698.081377s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38490}: linkerd_app_core::serve: Connection closed [ 1698.081424s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38484}: linkerd_app_core::serve: Connection closed [ 1698.674186s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(339), flags: (0x5: END_HEADERS | END_STREAM) } [ 1698.674247s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1698.675375s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(339), flags: (0x4: END_HEADERS) } [ 1698.675407s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(339), flags: (0x1: END_STREAM) } [ 1703.079848s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38552}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1703.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38552}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38552 [ 1703.079932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38554}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1703.079955s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38554}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38554 [ 1703.079978s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38552}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1703.080043s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38554}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1703.080117s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38552}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34150 keepalive=None [ 1703.080127s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38552}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1703.080146s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38554}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34152 keepalive=None [ 1703.080151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38554}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1703.081928s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38552}: linkerd_app_core::serve: Connection closed [ 1703.081979s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38554}: linkerd_app_core::serve: Connection closed [ 1708.079663s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38620}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1708.079707s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38620}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38620 [ 1708.079723s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1708.079745s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.925µs [ 1708.079754s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1708.079772s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1708.079750s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38622}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1708.079795s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38622}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38622 [ 1708.079812s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: hyper::proto::h1::io: parsed 4 headers [ 1708.079820s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: hyper::proto::h1::conn: incoming body is empty [ 1708.079824s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38620}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1708.079832s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58114 [ 1708.079911s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: hyper::proto::h1::io: flushed 106 bytes [ 1708.079909s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38622}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1708.079949s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1708.079970s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58114}: linkerd_app_core::serve: Connection closed [ 1708.079979s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1708.079988s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.396µs [ 1708.080007s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1708.079988s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38620}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34224 keepalive=None [ 1708.080013s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1708.080016s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38620}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1708.080026s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: hyper::proto::h1::io: parsed 4 headers [ 1708.080029s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: hyper::proto::h1::conn: incoming body is empty [ 1708.080035s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58122 [ 1708.080046s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38622}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34226 keepalive=None [ 1708.080050s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38622}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1708.080100s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: hyper::proto::h1::io: flushed 107 bytes [ 1708.080116s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1708.080131s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58122}: linkerd_app_core::serve: Connection closed [ 1708.081608s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38620}: linkerd_app_core::serve: Connection closed [ 1708.081818s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38622}: linkerd_app_core::serve: Connection closed [ 1708.675044s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(341), flags: (0x5: END_HEADERS | END_STREAM) } [ 1708.675100s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1708.676145s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(341), flags: (0x4: END_HEADERS) } [ 1708.676174s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(341), flags: (0x1: END_STREAM) } [ 1710.341450s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1710.341514s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1710.341522s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1713.079054s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38696}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1713.079099s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38696}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38696 [ 1713.079170s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38698}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1713.079186s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38698}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38698 [ 1713.079239s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38696}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1713.079342s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38698}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1713.079438s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38696}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34296 keepalive=None [ 1713.079455s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38696}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1713.079484s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38698}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34298 keepalive=None [ 1713.079494s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38698}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1713.081415s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38698}: linkerd_app_core::serve: Connection closed [ 1713.081551s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38696}: linkerd_app_core::serve: Connection closed [ 1718.079387s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38764}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1718.079431s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1718.079438s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38764}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38764 [ 1718.079457s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.687µs [ 1718.079467s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1718.079473s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1718.079487s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38768}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1718.079499s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: hyper::proto::h1::io: parsed 4 headers [ 1718.079515s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38768}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38768 [ 1718.079534s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: hyper::proto::h1::conn: incoming body is empty [ 1718.079567s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58258 [ 1718.079580s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38764}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1718.079648s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: hyper::proto::h1::io: flushed 107 bytes [ 1718.079666s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1718.079682s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38768}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1718.079687s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58258}: linkerd_app_core::serve: Connection closed [ 1718.079697s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1718.079705s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=2.855µs [ 1718.079710s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1718.079715s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1718.079730s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: hyper::proto::h1::io: parsed 4 headers [ 1718.079742s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: hyper::proto::h1::conn: incoming body is empty [ 1718.079747s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58264 [ 1718.079753s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38764}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34366 keepalive=None [ 1718.079777s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38764}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1718.079798s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: hyper::proto::h1::io: flushed 106 bytes [ 1718.079805s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38768}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34368 keepalive=None [ 1718.079814s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1718.079815s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38768}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1718.079837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58264}: linkerd_app_core::serve: Connection closed [ 1718.081613s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38764}: linkerd_app_core::serve: Connection closed [ 1718.081750s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38768}: linkerd_app_core::serve: Connection closed [ 1718.674147s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(343), flags: (0x5: END_HEADERS | END_STREAM) } [ 1718.674204s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1718.675239s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(343), flags: (0x4: END_HEADERS) } [ 1718.675271s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(343), flags: (0x1: END_STREAM) } [ 1723.078976s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38836}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1723.079031s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38836}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38836 [ 1723.079090s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38838}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1723.079110s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38838}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38838 [ 1723.079172s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38836}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1723.079281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38838}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1723.079359s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38836}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34436 keepalive=None [ 1723.079370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38836}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1723.079397s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38838}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34438 keepalive=None [ 1723.079401s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38838}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1723.081212s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38838}: linkerd_app_core::serve: Connection closed [ 1723.081272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38836}: linkerd_app_core::serve: Connection closed [ 1728.079191s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38910}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1728.079231s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1728.079234s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38910}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38910 [ 1728.079261s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.397µs [ 1728.079272s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1728.079280s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1728.079281s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38916}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1728.079317s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38916}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38916 [ 1728.079333s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: hyper::proto::h1::io: parsed 4 headers [ 1728.079343s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: hyper::proto::h1::conn: incoming body is empty [ 1728.079356s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38910}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1728.079356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58404 [ 1728.079451s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38916}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1728.079455s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: hyper::proto::h1::io: flushed 107 bytes [ 1728.079547s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38910}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34512 keepalive=None [ 1728.079562s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38910}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1728.079587s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38916}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34514 keepalive=None [ 1728.079594s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38916}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1728.079611s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1728.079639s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58404}: linkerd_app_core::serve: Connection closed [ 1728.079658s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1728.079672s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.94µs [ 1728.079679s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1728.079685s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1728.079708s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: hyper::proto::h1::io: parsed 4 headers [ 1728.079718s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: hyper::proto::h1::conn: incoming body is empty [ 1728.079727s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58406 [ 1728.079819s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: hyper::proto::h1::io: flushed 106 bytes [ 1728.079852s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1728.079874s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58406}: linkerd_app_core::serve: Connection closed [ 1728.081302s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38916}: linkerd_app_core::serve: Connection closed [ 1728.081347s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38910}: linkerd_app_core::serve: Connection closed [ 1728.675181s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(345), flags: (0x5: END_HEADERS | END_STREAM) } [ 1728.675235s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1728.676262s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(345), flags: (0x4: END_HEADERS) } [ 1728.676289s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(345), flags: (0x1: END_STREAM) } [ 1733.078893s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38976}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1733.078933s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38976}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38976 [ 1733.078964s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38978}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1733.078971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38978}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:38978 [ 1733.078991s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38976}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1733.079067s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38978}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1733.079145s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38976}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34574 keepalive=None [ 1733.079167s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38976}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1733.079185s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38978}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34576 keepalive=None [ 1733.079189s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38978}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1733.081022s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38978}: linkerd_app_core::serve: Connection closed [ 1733.081083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:38976}: linkerd_app_core::serve: Connection closed [ 1738.079237s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39050}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1738.079285s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39050}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39050 [ 1738.079306s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1738.079331s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.656µs [ 1738.079339s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1738.079333s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39048}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1738.079347s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1738.079345s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39048}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39048 [ 1738.079392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: hyper::proto::h1::io: parsed 4 headers [ 1738.079405s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: hyper::proto::h1::conn: incoming body is empty [ 1738.079394s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39050}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1738.079426s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58550 [ 1738.079502s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: hyper::proto::h1::io: flushed 106 bytes [ 1738.079508s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39048}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1738.079538s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1738.079557s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58550}: linkerd_app_core::serve: Connection closed [ 1738.079567s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1738.079573s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39050}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34652 keepalive=None [ 1738.079576s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.326µs [ 1738.079579s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39050}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1738.079580s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1738.079585s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1738.079597s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: hyper::proto::h1::io: parsed 4 headers [ 1738.079600s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: hyper::proto::h1::conn: incoming body is empty [ 1738.079600s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39048}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34654 keepalive=None [ 1738.079603s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39048}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1738.079604s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58542 [ 1738.079664s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: hyper::proto::h1::io: flushed 107 bytes [ 1738.079681s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1738.079702s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58542}: linkerd_app_core::serve: Connection closed [ 1738.081406s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39050}: linkerd_app_core::serve: Connection closed [ 1738.081452s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39048}: linkerd_app_core::serve: Connection closed [ 1738.674139s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(347), flags: (0x5: END_HEADERS | END_STREAM) } [ 1738.674196s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1738.675349s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(347), flags: (0x4: END_HEADERS) } [ 1738.675383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(347), flags: (0x1: END_STREAM) } [ 1743.079925s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39122}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1743.079976s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39122}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39122 [ 1743.080025s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39120}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1743.080039s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39120}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39120 [ 1743.080068s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39122}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1743.080170s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39120}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1743.080249s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39122}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34720 keepalive=None [ 1743.080262s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39122}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1743.080280s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39120}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34722 keepalive=None [ 1743.080291s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39120}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1743.082237s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39120}: linkerd_app_core::serve: Connection closed [ 1743.082388s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39122}: linkerd_app_core::serve: Connection closed [ 1748.079514s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39204}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1748.079545s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1748.079555s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39204}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39204 [ 1748.079573s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.366µs [ 1748.079582s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1748.079588s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1748.079600s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39196}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1748.079616s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39196}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39196 [ 1748.079620s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: hyper::proto::h1::io: parsed 4 headers [ 1748.079625s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: hyper::proto::h1::conn: incoming body is empty [ 1748.079636s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58692 [ 1748.079646s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39204}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1748.079728s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: hyper::proto::h1::io: flushed 106 bytes [ 1748.079746s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39196}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1748.079757s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1748.079782s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58692}: linkerd_app_core::serve: Connection closed [ 1748.079795s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1748.079806s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.258µs [ 1748.079828s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1748.079835s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1748.079851s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: hyper::proto::h1::io: parsed 4 headers [ 1748.079873s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: hyper::proto::h1::conn: incoming body is empty [ 1748.079850s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39204}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34800 keepalive=None [ 1748.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39204}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1748.079886s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58690 [ 1748.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39196}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34802 keepalive=None [ 1748.079927s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39196}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1748.079959s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: hyper::proto::h1::io: flushed 107 bytes [ 1748.079989s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1748.080006s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58690}: linkerd_app_core::serve: Connection closed [ 1748.081770s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39196}: linkerd_app_core::serve: Connection closed [ 1748.082061s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39204}: linkerd_app_core::serve: Connection closed [ 1748.675177s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(349), flags: (0x5: END_HEADERS | END_STREAM) } [ 1748.675229s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1748.676172s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(349), flags: (0x4: END_HEADERS) } [ 1748.676199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(349), flags: (0x1: END_STREAM) } [ 1750.337421s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1750.337473s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1750.337482s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1753.079193s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39270}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1753.079232s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39270}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39270 [ 1753.079265s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39268}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1753.079272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39268}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39268 [ 1753.079295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39270}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1753.079359s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39268}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1753.079422s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39270}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34868 keepalive=None [ 1753.079433s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39270}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1753.079457s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39268}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34870 keepalive=None [ 1753.079462s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39268}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1753.085824s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39270}: linkerd_app_core::serve: Connection closed [ 1753.085886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39268}: linkerd_app_core::serve: Connection closed [ 1758.079818s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39348}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1758.079876s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1758.079872s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39348}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39348 [ 1758.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=10.109µs [ 1758.079924s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1758.079941s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1758.079944s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39350}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1758.079966s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39350}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39350 [ 1758.079971s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: hyper::proto::h1::io: parsed 4 headers [ 1758.079993s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: hyper::proto::h1::conn: incoming body is empty [ 1758.080005s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39348}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1758.080005s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58848 [ 1758.080120s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: hyper::proto::h1::io: flushed 106 bytes [ 1758.080126s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39350}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1758.080194s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1758.080228s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58848}: linkerd_app_core::serve: Connection closed [ 1758.080244s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1758.080261s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.755µs [ 1758.080267s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1758.080272s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1758.080277s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39348}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34952 keepalive=None [ 1758.080290s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39348}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1758.080291s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: hyper::proto::h1::io: parsed 4 headers [ 1758.080326s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: hyper::proto::h1::conn: incoming body is empty [ 1758.080337s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58850 [ 1758.080345s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39350}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:34954 keepalive=None [ 1758.080350s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39350}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1758.080403s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: hyper::proto::h1::io: flushed 107 bytes [ 1758.080427s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1758.080449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58850}: linkerd_app_core::serve: Connection closed [ 1758.081921s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39350}: linkerd_app_core::serve: Connection closed [ 1758.082157s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39348}: linkerd_app_core::serve: Connection closed [ 1758.674971s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(351), flags: (0x5: END_HEADERS | END_STREAM) } [ 1758.675022s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1758.675877s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(351), flags: (0x4: END_HEADERS) } [ 1758.675903s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(351), flags: (0x1: END_STREAM) } [ 1763.079884s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39420}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1763.079927s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39420}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39420 [ 1763.079961s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39422}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1763.079973s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39422}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39422 [ 1763.079996s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39420}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1763.080083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1763.080148s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39420}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35018 keepalive=None [ 1763.080156s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39420}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1763.080174s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39422}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35020 keepalive=None [ 1763.080178s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39422}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1763.081854s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39422}: linkerd_app_core::serve: Connection closed [ 1763.081904s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39420}: linkerd_app_core::serve: Connection closed [ 1766.775601s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1766.777300s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50214}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1766.777325s] DEBUG ThreadId(01) evict{key=Accept { orig_dst: OrigDstAddr(10.0.115.236:5432), protocol: () }}: linkerd_cache: Awaiting idleness [ 1766.777842s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1766.777862s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 1766.777944s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777959s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777964s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777969s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777973s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777978s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777982s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777986s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777991s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.777996s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778000s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778027s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778032s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778037s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778041s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778046s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778052s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778057s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778069s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778077s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778081s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778086s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778091s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778137s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778152s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778157s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778162s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778166s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778173s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778178s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778183s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778195s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778200s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778209s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778215s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1766.778227s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778233s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778238s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778248s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778253s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778258s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778267s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778272s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778281s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778287s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778295s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778300s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778308s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778313s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778324s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778329s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778341s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778345s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778349s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778355s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778364s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778368s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778376s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778381s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778385s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778390s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778399s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778404s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778413s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778423s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778428s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778439s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778444s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778449s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778459s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778464s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778470s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778474s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778483s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778489s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778493s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778498s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778508s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778513s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778517s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778522s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778530s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778535s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778540s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778549s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778554s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778558s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778563s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778568s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778572s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778576s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778581s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: canceled endpoint removed when ready [ 1766.778597s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1766.778618s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Using opaque transport target_port=5432 opaque_port=4143 [ 1766.778630s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connecting server.addr=10.244.2.2:4143 [ 1766.779201s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:58720 keepalive=Some(10s) [ 1766.779227s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: No cached session for DnsName(DnsName(DnsName("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))) [ 1766.779264s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Not resuming any session [ 1766.779683s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: Using ciphersuite TLS13_CHACHA20_POLY1305_SHA256 [ 1766.779698s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Not resuming [ 1766.779769s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: TLS1.3 encrypted extensions: [Protocols([7472616e73706f72742e6c35642e696f2f7631]), ServerNameAck] [ 1766.779779s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::hs: ALPN protocol is Some(b"transport.l5d.io/v1") [ 1766.779789s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::tls13: Got CertificateRequest CertificateRequestPayloadTLS13 { context: , extensions: [SignatureAlgorithms([ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256]), AuthorityNames([3029312730250603550403131e726f6f742e6c696e6b6572642e706572662e6e61706965722e636c6f7564])] } [ 1766.779804s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: rustls::client::common: Attempting client auth [ 1766.780111s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_tls::client: alpn=transport.l5d.io/v1 [ 1766.780137s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_app_outbound::tcp::opaque_transport: Wrote transport header sz=30 [ 1766.780143s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47538}:proxy{addr=10.0.115.236:5432}:tcp:endpoint{server.addr=10.244.2.2:5432 server.id=postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local}: linkerd_transport_metrics::client: client connection open [ 1768.056717s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1768.056828s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1768.056847s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover [ 1768.056873s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}:proxy{addr=10.0.115.236:5432}:tcp: tower::ready_cache::cache: endpoint canceled [ 1768.056888s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical service has become unavailable [ 1768.058393s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1768.078997s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39494}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1768.079049s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39494}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39494 [ 1768.079064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1768.079091s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.746µs [ 1768.079101s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1768.079098s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39498}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1768.079111s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1768.079109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39498}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39498 [ 1768.079158s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39494}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1768.079165s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: hyper::proto::h1::io: parsed 4 headers [ 1768.079183s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: hyper::proto::h1::conn: incoming body is empty [ 1768.079196s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58990 [ 1768.079257s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39498}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1768.079286s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: hyper::proto::h1::io: flushed 107 bytes [ 1768.079308s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1768.079312s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39494}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35096 keepalive=None [ 1768.079318s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39494}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1768.079327s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58990}: linkerd_app_core::serve: Connection closed [ 1768.079337s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1768.079340s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39498}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35098 keepalive=None [ 1768.079344s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39498}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1768.079348s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.759µs [ 1768.079354s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1768.079359s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1768.079375s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: hyper::proto::h1::io: parsed 4 headers [ 1768.079392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: hyper::proto::h1::conn: incoming body is empty [ 1768.079398s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:58994 [ 1768.079452s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: hyper::proto::h1::io: flushed 106 bytes [ 1768.079476s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1768.079490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:58994}: linkerd_app_core::serve: Connection closed [ 1768.081082s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39494}: linkerd_app_core::serve: Connection closed [ 1768.081129s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39498}: linkerd_app_core::serve: Connection closed [ 1768.674225s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(353), flags: (0x5: END_HEADERS | END_STREAM) } [ 1768.674285s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1768.675404s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(353), flags: (0x4: END_HEADERS) } [ 1768.675432s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(353), flags: (0x1: END_STREAM) } [ 1771.058235s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical entering failfast after 3s [ 1771.058261s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1771.058264s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1771.058328s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47552 [ 1771.312850s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47608}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1771.312879s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47608}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1771.312883s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47608}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1771.312917s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47608}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47608 [ 1771.688549s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47610}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1771.688578s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47610}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1771.688582s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47610}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1771.688620s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47610}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47610 [ 1772.251219s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47614}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1772.251246s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47614}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1772.251250s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47614}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1772.251285s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47614}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47614 [ 1773.079987s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39556}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1773.080031s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39556}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39556 [ 1773.080070s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39558}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1773.080079s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39558}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39558 [ 1773.080107s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39556}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1773.080202s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1773.080284s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39556}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35156 keepalive=None [ 1773.080302s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39556}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1773.080326s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35158 keepalive=None [ 1773.080330s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39558}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1773.082094s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39558}: linkerd_app_core::serve: Connection closed [ 1773.082130s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39556}: linkerd_app_core::serve: Connection closed [ 1773.094802s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47626}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1773.094824s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47626}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1773.094828s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47626}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1773.094855s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47626}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47626 [ 1774.359538s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47678}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1774.359570s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47678}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1774.359574s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47678}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1774.359611s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47678}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47678 [ 1776.256150s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47690}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1776.256176s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47690}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1776.256179s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47690}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1776.256208s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47690}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47690 [ 1778.079563s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39644}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1778.079608s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39644}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39644 [ 1778.079618s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1778.079640s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.095µs [ 1778.079649s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1778.079657s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1778.079652s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39638}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1778.079664s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39638}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39638 [ 1778.079690s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: hyper::proto::h1::io: parsed 4 headers [ 1778.079698s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39644}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1778.079699s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: hyper::proto::h1::conn: incoming body is empty [ 1778.079730s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59132 [ 1778.079801s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39638}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1778.079829s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: hyper::proto::h1::io: flushed 107 bytes [ 1778.079871s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1778.079871s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39644}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35240 keepalive=None [ 1778.079902s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39644}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1778.079908s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59132}: linkerd_app_core::serve: Connection closed [ 1778.079931s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39638}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35242 keepalive=None [ 1778.079949s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39638}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1778.079933s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1778.079964s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.24µs [ 1778.079976s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1778.079983s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1778.079997s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: hyper::proto::h1::io: parsed 4 headers [ 1778.080006s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: hyper::proto::h1::conn: incoming body is empty [ 1778.080012s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59136 [ 1778.080070s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: hyper::proto::h1::io: flushed 106 bytes [ 1778.080088s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1778.080106s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59136}: linkerd_app_core::serve: Connection closed [ 1778.081576s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39644}: linkerd_app_core::serve: Connection closed [ 1778.081614s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39638}: linkerd_app_core::serve: Connection closed [ 1778.675160s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(355), flags: (0x5: END_HEADERS | END_STREAM) } [ 1778.675216s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1778.676243s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(355), flags: (0x4: END_HEADERS) } [ 1778.676273s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(355), flags: (0x1: END_STREAM) } [ 1779.100827s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47752}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1779.100856s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47752}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1779.100860s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47752}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1779.100903s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47752}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47752 [ 1783.079207s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39712}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1783.079250s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39712}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39712 [ 1783.079291s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39714}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1783.079305s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39714}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39714 [ 1783.079334s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39712}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1783.079419s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39714}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1783.079462s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39712}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35312 keepalive=None [ 1783.079474s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39712}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1783.079495s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39714}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35314 keepalive=None [ 1783.079523s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39714}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1783.081213s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39712}: linkerd_app_core::serve: Connection closed [ 1783.081248s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39714}: linkerd_app_core::serve: Connection closed [ 1783.367471s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47788}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1783.367503s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47788}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1783.367506s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47788}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1783.367535s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47788}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47788 [ 1785.459248s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1785.460919s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50222}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1788.079930s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39788}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1788.079962s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1788.079987s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39788}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39788 [ 1788.080008s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=11.602µs [ 1788.080020s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1788.080028s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1788.080037s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39790}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1788.080054s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39790}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39790 [ 1788.080060s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: hyper::proto::h1::io: parsed 4 headers [ 1788.080064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: hyper::proto::h1::conn: incoming body is empty [ 1788.080076s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59288 [ 1788.080083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39788}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1788.080179s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: hyper::proto::h1::io: flushed 106 bytes [ 1788.080211s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39790}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1788.080214s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1788.080234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59288}: linkerd_app_core::serve: Connection closed [ 1788.080254s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1788.080268s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.741µs [ 1788.080278s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1788.080284s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1788.080286s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39788}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35390 keepalive=None [ 1788.080292s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39788}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1788.080298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: hyper::proto::h1::io: parsed 4 headers [ 1788.080301s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: hyper::proto::h1::conn: incoming body is empty [ 1788.080306s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59282 [ 1788.080314s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39790}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35392 keepalive=None [ 1788.080318s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39790}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1788.080392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: hyper::proto::h1::io: flushed 107 bytes [ 1788.080423s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1788.080441s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59282}: linkerd_app_core::serve: Connection closed [ 1788.082121s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39790}: linkerd_app_core::serve: Connection closed [ 1788.082161s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39788}: linkerd_app_core::serve: Connection closed [ 1788.674708s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(357), flags: (0x5: END_HEADERS | END_STREAM) } [ 1788.674768s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1788.675806s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(357), flags: (0x4: END_HEADERS) } [ 1788.675837s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(357), flags: (0x1: END_STREAM) } [ 1789.767164s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47898}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1789.767192s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47898}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1789.767196s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47898}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1789.767241s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:47898}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:47898 [ 1791.380015s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1791.381709s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50218}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1793.079335s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39858}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1793.079373s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39858}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39858 [ 1793.079417s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39856}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1793.079435s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39856}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39856 [ 1793.079466s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39858}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1793.079558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39856}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1793.079650s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39858}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35456 keepalive=None [ 1793.079657s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39858}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1793.079674s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39856}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35458 keepalive=None [ 1793.079677s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39856}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1793.081356s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39858}: linkerd_app_core::serve: Connection closed [ 1793.081510s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39856}: linkerd_app_core::serve: Connection closed [ 1794.286260s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1794.288394s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50198}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1794.864550s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1794.866176s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50190}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1795.707424s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1795.709117s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50206}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1798.079788s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39926}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1798.079839s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39926}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39926 [ 1798.079868s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1798.079891s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39930}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1798.079911s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39930}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39930 [ 1798.079897s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.887µs [ 1798.079935s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1798.079946s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1798.079951s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39926}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1798.079987s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: hyper::proto::h1::io: parsed 4 headers [ 1798.079995s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: hyper::proto::h1::conn: incoming body is empty [ 1798.080016s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59424 [ 1798.080035s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39930}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1798.080090s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39926}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35528 keepalive=None [ 1798.080107s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39926}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1798.080120s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: hyper::proto::h1::io: flushed 107 bytes [ 1798.080136s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39930}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35530 keepalive=None [ 1798.080142s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39930}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1798.080151s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1798.080171s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59424}: linkerd_app_core::serve: Connection closed [ 1798.080183s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1798.080193s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.007µs [ 1798.080211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1798.080217s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1798.080234s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: hyper::proto::h1::io: parsed 4 headers [ 1798.080241s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: hyper::proto::h1::conn: incoming body is empty [ 1798.080248s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59420 [ 1798.080336s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: hyper::proto::h1::io: flushed 106 bytes [ 1798.080363s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1798.080379s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59420}: linkerd_app_core::serve: Connection closed [ 1798.081849s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39930}: linkerd_app_core::serve: Connection closed [ 1798.082051s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39926}: linkerd_app_core::serve: Connection closed [ 1798.674441s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(359), flags: (0x5: END_HEADERS | END_STREAM) } [ 1798.674514s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1798.675495s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(359), flags: (0x4: END_HEADERS) } [ 1798.675530s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(359), flags: (0x1: END_STREAM) } [ 1799.368096s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48046}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1799.368124s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48046}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1799.368128s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48046}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1799.368156s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:48046}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:48046 [ 1800.522477s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1800.523817s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50210}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1803.079513s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39996}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1803.079549s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39996}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39996 [ 1803.079585s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39994}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1803.079592s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39994}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:39994 [ 1803.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39996}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1803.079685s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1803.079739s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39996}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35594 keepalive=None [ 1803.079761s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39996}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1803.079784s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39994}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35596 keepalive=None [ 1803.079800s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39994}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1803.081699s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39996}: linkerd_app_core::serve: Connection closed [ 1803.081750s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:39994}: linkerd_app_core::serve: Connection closed [ 1804.909901s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1804.911711s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50186}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1806.684053s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}:proxy{addr=10.0.115.236:5432}:tcp: rustls::conn: Sending warning alert CloseNotify [ 1806.685872s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50194}: linkerd_app_core::serve: Connection closed reason=unexpected end of file [ 1808.079075s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40078}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1808.079140s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40078}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40078 [ 1808.079150s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1808.079176s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.235µs [ 1808.079185s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1808.079191s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1808.079197s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40080}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1808.079215s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40080}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40080 [ 1808.079217s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: hyper::proto::h1::io: parsed 4 headers [ 1808.079244s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: hyper::proto::h1::conn: incoming body is empty [ 1808.079256s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59574 [ 1808.079269s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40078}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1808.079356s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: hyper::proto::h1::io: flushed 106 bytes [ 1808.079370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40080}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1808.079383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1808.079410s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59574}: linkerd_app_core::serve: Connection closed [ 1808.079423s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1808.079443s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=11.611µs [ 1808.079449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1808.079453s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1808.079471s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: hyper::proto::h1::io: parsed 4 headers [ 1808.079474s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: hyper::proto::h1::conn: incoming body is empty [ 1808.079480s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59572 [ 1808.079483s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40078}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35684 keepalive=None [ 1808.079494s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40078}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1808.079518s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40080}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35686 keepalive=None [ 1808.079523s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40080}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1808.079548s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: hyper::proto::h1::io: flushed 107 bytes [ 1808.079578s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1808.079594s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59572}: linkerd_app_core::serve: Connection closed [ 1808.081130s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40080}: linkerd_app_core::serve: Connection closed [ 1808.081167s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40078}: linkerd_app_core::serve: Connection closed [ 1808.675232s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(361), flags: (0x5: END_HEADERS | END_STREAM) } [ 1808.675287s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1808.676298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(361), flags: (0x4: END_HEADERS) } [ 1808.676323s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(361), flags: (0x1: END_STREAM) } [ 1809.368715s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48202}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1809.368743s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48202}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical in failfast [ 1809.368747s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48202}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service.ready=true processing request [ 1809.368779s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:48202}: linkerd_app_core::serve: Connection closed error=TCP Logical service in fail-fast client.addr=10.244.7.14:48202 [ 1810.339171s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_read: received frame=Data { stream_id: StreamId(3) } [ 1810.339230s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_api_resolve::resolve: Add endpoints=1 [ 1810.339238s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_proxy_discover::from_resolve: Changed change=Insert(10.244.2.2:5432, Endpoint { addr: Remote(ServerAddr(10.244.2.2:5432)), tls: Some(ClientTls { server_id: ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local")), alpn: Some(AlpnProtocols("transport.l5d.io/v1")) }), metadata: Metadata { labels: {"control_plane_ns": "linkerd", "namespace": "multi", "pod": "postgres-instance1-5f7t-0", "service": "postgres-ha", "serviceaccount": "postgres-instance", "statefulset": "postgres-instance1-5f7t"}, protocol_hint: Http2, opaque_transport_port: Some(4143), identity: Some(ServerId(Name("postgres-instance.multi.serviceaccount.identity.linkerd.cluster.local"))), authority_override: None }, logical_addr: Some(LogicalAddr(postgres-ha.multi.svc.cluster.local:5432)), protocol: (), opaque_protocol: false }) [ 1810.339278s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:47552}:proxy{addr=10.0.115.236:5432}:tcp: tower::balance::p2c::service: updating from discover thread 'main' panicked at 'cancel receiver lost: ()', /usr/local/cargo/registry/src/github.com-1ecc6299db9ec823/tower-0.4.12/src/ready_cache/cache.rs:234:24 note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace [ 1810.339485s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Reset { stream_id: StreamId(3), error_code: CANCEL } [ 1813.079621s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40160}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1813.079662s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40160}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40160 [ 1813.079705s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40158}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1813.079726s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40158}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40158 [ 1813.079759s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40160}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1813.079853s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40158}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1813.079914s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40160}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35758 keepalive=None [ 1813.079948s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40160}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1813.079971s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40158}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35760 keepalive=None [ 1813.079975s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40158}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1813.081634s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40158}: linkerd_app_core::serve: Connection closed [ 1813.081680s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40160}: linkerd_app_core::serve: Connection closed [ 1818.079431s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40232}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1818.079475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1818.079478s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40232}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40232 [ 1818.079499s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.564µs [ 1818.079507s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1818.079513s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1818.079530s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40234}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1818.079548s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: hyper::proto::h1::io: parsed 4 headers [ 1818.079552s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: hyper::proto::h1::conn: incoming body is empty [ 1818.079548s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40234}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40234 [ 1818.079562s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59726 [ 1818.079587s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1818.079648s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: hyper::proto::h1::io: flushed 106 bytes [ 1818.079673s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1818.079698s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59726}: linkerd_app_core::serve: Connection closed [ 1818.079701s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1818.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1818.079834s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.024µs [ 1818.079835s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40232}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35836 keepalive=None [ 1818.079842s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1818.079843s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40232}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1818.079847s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1818.079861s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40234}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35838 keepalive=None [ 1818.079885s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40234}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1818.079863s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: hyper::proto::h1::io: parsed 4 headers [ 1818.079893s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: hyper::proto::h1::conn: incoming body is empty [ 1818.079911s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59734 [ 1818.079986s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: hyper::proto::h1::io: flushed 107 bytes [ 1818.080006s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1818.080025s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59734}: linkerd_app_core::serve: Connection closed [ 1818.081434s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40234}: linkerd_app_core::serve: Connection closed [ 1818.081478s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40232}: linkerd_app_core::serve: Connection closed [ 1818.674297s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(363), flags: (0x5: END_HEADERS | END_STREAM) } [ 1818.674360s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1818.675266s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(363), flags: (0x4: END_HEADERS) } [ 1818.675293s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(363), flags: (0x1: END_STREAM) } [ 1819.369474s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48346}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service.ready=true processing request [ 1819.369519s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:48346}:proxy{addr=10.0.115.236:5432}:tcp: linkerd_stack::failfast: TCP Logical service has recovered [ 1819.369525s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48346}:proxy{addr=10.0.115.236:5432}:tcp: tower::buffer::worker: service failed error=task 1287 panicked [ 1819.369532s] DEBUG ThreadId(01) tower::buffer::worker: buffer closing; waking pending tasks [ 1819.369585s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:48346}: linkerd_app_core::serve: Connection closed error=buffered service failed: task 1287 panicked error.sources=[task 1287 panicked] client.addr=10.244.7.14:48346 [ 1823.079676s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40308}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1823.079711s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40308}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40308 [ 1823.079744s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40310}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1823.079751s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40310}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40310 [ 1823.079773s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40308}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1823.079859s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40310}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1823.079930s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40308}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35908 keepalive=None [ 1823.079945s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40308}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1823.079968s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40310}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35910 keepalive=None [ 1823.079977s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40310}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1823.081645s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40308}: linkerd_app_core::serve: Connection closed [ 1823.081700s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40310}: linkerd_app_core::serve: Connection closed [ 1828.079968s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40380}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1828.080010s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1828.080020s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40380}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40380 [ 1828.080033s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.294µs [ 1828.080041s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1828.080048s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1828.080074s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: hyper::proto::h1::io: parsed 4 headers [ 1828.080101s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: hyper::proto::h1::conn: incoming body is empty [ 1828.080076s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40384}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1828.080109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40384}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40384 [ 1828.080115s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59872 [ 1828.080152s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40380}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1828.080194s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: hyper::proto::h1::io: flushed 107 bytes [ 1828.080218s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1828.080237s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59872}: linkerd_app_core::serve: Connection closed [ 1828.080261s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1828.080268s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40384}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1828.080273s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.519µs [ 1828.080322s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1828.080348s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40380}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35980 keepalive=None [ 1828.080375s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40380}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1828.080353s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1828.080408s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40384}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:35982 keepalive=None [ 1828.080417s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40384}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1828.080421s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: hyper::proto::h1::io: parsed 4 headers [ 1828.080425s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: hyper::proto::h1::conn: incoming body is empty [ 1828.080432s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:59876 [ 1828.080521s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: hyper::proto::h1::io: flushed 106 bytes [ 1828.080540s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1828.080553s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:59876}: linkerd_app_core::serve: Connection closed [ 1828.081996s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40380}: linkerd_app_core::serve: Connection closed [ 1828.082039s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40384}: linkerd_app_core::serve: Connection closed [ 1828.675298s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(365), flags: (0x5: END_HEADERS | END_STREAM) } [ 1828.675355s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1828.676387s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(365), flags: (0x4: END_HEADERS) } [ 1828.676418s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(365), flags: (0x1: END_STREAM) } [ 1829.372191s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:48490}:proxy{addr=10.0.115.236:5432}: tower::buffer::worker: service failed error=buffered service failed: task 1287 panicked [ 1829.372216s] DEBUG ThreadId(01) tower::buffer::worker: buffer closing; waking pending tasks [ 1829.372249s] INFO ThreadId(01) outbound:accept{client.addr=10.244.7.14:48490}: linkerd_app_core::serve: Connection closed error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:48490 [ 1829.372262s] DEBUG ThreadId(01) evict{key=Logical { protocol: (), profile: .., logical_addr: LogicalAddr(postgres-ha.multi.svc.cluster.local:5432) }}: linkerd_cache: Awaiting idleness [ 1833.079220s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40442}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1833.079271s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40442}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40442 [ 1833.079321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40444}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1833.079335s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40444}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40444 [ 1833.079365s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40442}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1833.079456s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40444}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1833.079558s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40442}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36042 keepalive=None [ 1833.079575s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40442}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1833.079609s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40444}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36044 keepalive=None [ 1833.079620s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40444}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1833.081205s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40442}: linkerd_app_core::serve: Connection closed [ 1833.081284s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40444}: linkerd_app_core::serve: Connection closed [ 1834.372676s] DEBUG ThreadId(01) evict{key=Logical { protocol: (), profile: .., logical_addr: LogicalAddr(postgres-ha.multi.svc.cluster.local:5432) }}: linkerd_cache: Dropping cache entry key=Logical { protocol: (), profile: .., logical_addr: LogicalAddr(postgres-ha.multi.svc.cluster.local:5432) } [ 1834.372749s] DEBUG ThreadId(01) outbound:accept{client.addr=10.244.7.14:50170}:proxy{addr=10.0.115.236:5432}:controller{addr=linkerd-dst-headless.linkerd.svc.cluster.local:8086}:endpoint{addr=10.244.3.16:8086}:h2:Connection{peer=Client}: h2::codec::framed_write: send frame=Reset { stream_id: StreamId(1), error_code: CANCEL } [ 1838.079589s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40522}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1838.079646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1838.079643s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40522}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40522 [ 1838.079667s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.003µs [ 1838.079675s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1838.079681s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1838.079699s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40524}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1838.079711s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: hyper::proto::h1::io: parsed 4 headers [ 1838.079728s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40524}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40524 [ 1838.079736s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: hyper::proto::h1::conn: incoming body is empty [ 1838.079748s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60016 [ 1838.079763s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40522}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1838.079829s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: hyper::proto::h1::io: flushed 107 bytes [ 1838.079850s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1838.079853s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40524}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1838.079873s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60016}: linkerd_app_core::serve: Connection closed [ 1838.079892s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1838.079908s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.158µs [ 1838.079915s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1838.079920s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1838.079924s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40522}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36128 keepalive=None [ 1838.079934s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40522}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1838.079940s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: hyper::proto::h1::io: parsed 4 headers [ 1838.079943s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: hyper::proto::h1::conn: incoming body is empty [ 1838.079951s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60018 [ 1838.079958s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40524}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36130 keepalive=None [ 1838.080002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40524}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1838.080040s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: hyper::proto::h1::io: flushed 106 bytes [ 1838.080070s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1838.080085s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60018}: linkerd_app_core::serve: Connection closed [ 1838.081506s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40524}: linkerd_app_core::serve: Connection closed [ 1838.081657s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40522}: linkerd_app_core::serve: Connection closed [ 1838.674610s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(367), flags: (0x5: END_HEADERS | END_STREAM) } [ 1838.674672s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1838.675714s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(367), flags: (0x4: END_HEADERS) } [ 1838.675744s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(367), flags: (0x1: END_STREAM) } [ 1839.372799s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:48646}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:48646 [ 1843.078998s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40600}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1843.079042s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40600}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40600 [ 1843.079093s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40598}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1843.079116s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40598}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40598 [ 1843.079175s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40600}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1843.079282s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40598}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1843.079372s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40600}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36198 keepalive=None [ 1843.079392s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40600}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1843.079422s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40598}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36200 keepalive=None [ 1843.079437s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40598}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1843.081101s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40600}: linkerd_app_core::serve: Connection closed [ 1843.081151s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40598}: linkerd_app_core::serve: Connection closed [ 1848.079392s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40676}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1848.079442s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40676}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40676 [ 1848.079457s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1848.079479s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.135µs [ 1848.079489s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1848.079498s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1848.079492s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40678}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1848.079515s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40678}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40678 [ 1848.079531s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: hyper::proto::h1::io: parsed 4 headers [ 1848.079542s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: hyper::proto::h1::conn: incoming body is empty [ 1848.079554s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40676}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1848.079561s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60178 [ 1848.079636s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: hyper::proto::h1::io: flushed 106 bytes [ 1848.079647s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40678}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1848.079661s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1848.079684s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60178}: linkerd_app_core::serve: Connection closed [ 1848.079704s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1848.079718s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40676}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36280 keepalive=None [ 1848.079721s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.232µs [ 1848.079728s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40676}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1848.079729s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1848.079737s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1848.079755s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40678}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36282 keepalive=None [ 1848.079758s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: hyper::proto::h1::io: parsed 4 headers [ 1848.079761s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40678}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1848.079762s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: hyper::proto::h1::conn: incoming body is empty [ 1848.079778s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60170 [ 1848.079871s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: hyper::proto::h1::io: flushed 107 bytes [ 1848.079911s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1848.079937s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60170}: linkerd_app_core::serve: Connection closed [ 1848.081461s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40676}: linkerd_app_core::serve: Connection closed [ 1848.081519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40678}: linkerd_app_core::serve: Connection closed [ 1848.674584s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(369), flags: (0x5: END_HEADERS | END_STREAM) } [ 1848.674640s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1848.675637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(369), flags: (0x4: END_HEADERS) } [ 1848.675663s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(369), flags: (0x1: END_STREAM) } [ 1849.373582s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:48790}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:48790 [ 1853.079763s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40750}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1853.079807s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40750}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40750 [ 1853.079843s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40748}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1853.079850s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40748}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40748 [ 1853.079874s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40750}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1853.079947s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40748}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1853.080014s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40750}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36348 keepalive=None [ 1853.080030s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40750}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1853.080061s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40748}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36350 keepalive=None [ 1853.080072s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40748}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1853.081814s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40748}: linkerd_app_core::serve: Connection closed [ 1853.081869s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40750}: linkerd_app_core::serve: Connection closed [ 1858.079571s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40824}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1858.079600s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1858.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40824}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40824 [ 1858.079655s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.417µs [ 1858.079664s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1858.079671s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1858.079679s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40826}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1858.079689s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40826}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40826 [ 1858.079697s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: hyper::proto::h1::io: parsed 4 headers [ 1858.079704s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: hyper::proto::h1::conn: incoming body is empty [ 1858.079714s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40824}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1858.079714s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60318 [ 1858.079809s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40826}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1858.079811s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: hyper::proto::h1::io: flushed 106 bytes [ 1858.079861s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1858.079881s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60318}: linkerd_app_core::serve: Connection closed [ 1858.079904s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1858.079916s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.358µs [ 1858.079920s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1858.079917s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40824}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36424 keepalive=None [ 1858.079926s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1858.079939s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: hyper::proto::h1::io: parsed 4 headers [ 1858.079965s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: hyper::proto::h1::conn: incoming body is empty [ 1858.079971s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60322 [ 1858.079941s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40824}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1858.080003s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40826}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36426 keepalive=None [ 1858.080010s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40826}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1858.080029s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: hyper::proto::h1::io: flushed 107 bytes [ 1858.080048s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1858.080064s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60322}: linkerd_app_core::serve: Connection closed [ 1858.081541s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40824}: linkerd_app_core::serve: Connection closed [ 1858.081733s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40826}: linkerd_app_core::serve: Connection closed [ 1858.675092s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(371), flags: (0x5: END_HEADERS | END_STREAM) } [ 1858.675168s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1858.676252s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(371), flags: (0x4: END_HEADERS) } [ 1858.676280s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(371), flags: (0x1: END_STREAM) } [ 1859.376382s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:48938}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:48938 [ 1863.079422s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40888}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1863.079458s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40888}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40888 [ 1863.079496s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40886}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1863.079507s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40886}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40886 [ 1863.079531s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40888}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1863.079617s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40886}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1863.079675s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40888}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36486 keepalive=None [ 1863.079686s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40888}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1863.079716s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40886}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36488 keepalive=None [ 1863.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40886}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1863.081277s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40888}: linkerd_app_core::serve: Connection closed [ 1863.081325s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40886}: linkerd_app_core::serve: Connection closed [ 1868.079485s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40962}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1868.079537s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1868.079538s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40962}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40962 [ 1868.079563s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.999µs [ 1868.079575s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1868.079585s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1868.079585s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40970}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1868.079596s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40970}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:40970 [ 1868.079619s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40962}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1868.079624s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: hyper::proto::h1::io: parsed 4 headers [ 1868.079645s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: hyper::proto::h1::conn: incoming body is empty [ 1868.079662s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60458 [ 1868.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40970}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1868.079766s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: hyper::proto::h1::io: flushed 107 bytes [ 1868.079784s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40962}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36566 keepalive=None [ 1868.079793s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40962}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1868.079794s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1868.079822s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60458}: linkerd_app_core::serve: Connection closed [ 1868.079827s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40970}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36568 keepalive=None [ 1868.079881s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40970}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1868.079867s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1868.079931s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.147µs [ 1868.079949s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1868.079955s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1868.079975s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: hyper::proto::h1::io: parsed 4 headers [ 1868.079978s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: hyper::proto::h1::conn: incoming body is empty [ 1868.079990s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60456 [ 1868.080085s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: hyper::proto::h1::io: flushed 106 bytes [ 1868.080111s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1868.080126s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60456}: linkerd_app_core::serve: Connection closed [ 1868.081440s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40970}: linkerd_app_core::serve: Connection closed [ 1868.081615s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:40962}: linkerd_app_core::serve: Connection closed [ 1868.674600s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(373), flags: (0x5: END_HEADERS | END_STREAM) } [ 1868.674660s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1868.675665s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(373), flags: (0x4: END_HEADERS) } [ 1868.675694s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(373), flags: (0x1: END_STREAM) } [ 1869.376951s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:49080}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:49080 [ 1873.078990s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41048}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1873.079038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41048}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41048 [ 1873.079083s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41046}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1873.079092s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41046}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41046 [ 1873.079115s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41048}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1873.079244s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41046}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1873.079321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41048}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36646 keepalive=None [ 1873.079328s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41048}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1873.079344s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41046}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36648 keepalive=None [ 1873.079353s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41046}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1873.081006s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41046}: linkerd_app_core::serve: Connection closed [ 1873.081229s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41048}: linkerd_app_core::serve: Connection closed [ 1878.079098s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41118}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1878.079173s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41118}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41118 [ 1878.079197s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1878.079223s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.298µs [ 1878.079233s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1878.079226s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41120}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1878.079260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1878.079274s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41120}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41120 [ 1878.079306s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: hyper::proto::h1::io: parsed 4 headers [ 1878.079312s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41118}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1878.079316s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: hyper::proto::h1::conn: incoming body is empty [ 1878.079328s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60612 [ 1878.079417s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41120}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1878.079423s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: hyper::proto::h1::io: flushed 106 bytes [ 1878.079481s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1878.079511s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60612}: linkerd_app_core::serve: Connection closed [ 1878.079514s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41118}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36722 keepalive=None [ 1878.079519s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41118}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1878.079524s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1878.079538s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.01µs [ 1878.079544s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1878.079544s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41120}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36724 keepalive=None [ 1878.079549s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41120}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1878.079550s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1878.079567s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: hyper::proto::h1::io: parsed 4 headers [ 1878.079585s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: hyper::proto::h1::conn: incoming body is empty [ 1878.079594s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60620 [ 1878.079665s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: hyper::proto::h1::io: flushed 107 bytes [ 1878.079694s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1878.079714s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60620}: linkerd_app_core::serve: Connection closed [ 1878.081145s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41118}: linkerd_app_core::serve: Connection closed [ 1878.081204s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41120}: linkerd_app_core::serve: Connection closed [ 1878.674621s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(375), flags: (0x5: END_HEADERS | END_STREAM) } [ 1878.674679s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1878.675638s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(375), flags: (0x4: END_HEADERS) } [ 1878.675664s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(375), flags: (0x1: END_STREAM) } [ 1879.377553s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:49228}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:49228 [ 1883.079423s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41188}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1883.079466s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41188}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41188 [ 1883.079506s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41190}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1883.079520s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41190}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41190 [ 1883.079548s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41188}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1883.079631s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41190}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1883.079694s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41188}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36788 keepalive=None [ 1883.079709s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41188}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1883.079737s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41190}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36790 keepalive=None [ 1883.079742s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41190}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1883.081283s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41190}: linkerd_app_core::serve: Connection closed [ 1883.081418s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41188}: linkerd_app_core::serve: Connection closed [ 1888.079357s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41266}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1888.079407s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41266}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41266 [ 1888.079429s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1888.079454s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.747µs [ 1888.079464s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1888.079461s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41264}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1888.079501s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41264}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41264 [ 1888.079490s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1888.079547s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41266}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1888.079555s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: hyper::proto::h1::io: parsed 4 headers [ 1888.079560s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: hyper::proto::h1::conn: incoming body is empty [ 1888.079573s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60758 [ 1888.079649s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41264}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1888.079664s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: hyper::proto::h1::io: flushed 107 bytes [ 1888.079685s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1888.079707s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60758}: linkerd_app_core::serve: Connection closed [ 1888.079718s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1888.079720s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41266}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36868 keepalive=None [ 1888.079726s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41266}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1888.079728s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.047µs [ 1888.079732s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1888.079737s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1888.079745s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41264}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36870 keepalive=None [ 1888.079749s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41264}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1888.079749s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: hyper::proto::h1::io: parsed 4 headers [ 1888.079779s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: hyper::proto::h1::conn: incoming body is empty [ 1888.079787s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60766 [ 1888.079845s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: hyper::proto::h1::io: flushed 106 bytes [ 1888.079874s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1888.079906s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60766}: linkerd_app_core::serve: Connection closed [ 1888.081306s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41264}: linkerd_app_core::serve: Connection closed [ 1888.081342s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41266}: linkerd_app_core::serve: Connection closed [ 1888.675217s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(377), flags: (0x5: END_HEADERS | END_STREAM) } [ 1888.675275s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1888.676228s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(377), flags: (0x4: END_HEADERS) } [ 1888.676255s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(377), flags: (0x1: END_STREAM) } [ 1889.380492s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:49376}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:49376 [ 1893.079762s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41324}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1893.079803s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41324}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41324 [ 1893.079845s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41326}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1893.079858s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41326}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41326 [ 1893.079885s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41324}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1893.079977s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41326}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1893.080058s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41324}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36924 keepalive=None [ 1893.080078s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41324}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1893.080109s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41326}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:36926 keepalive=None [ 1893.080115s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41326}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1893.081653s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41324}: linkerd_app_core::serve: Connection closed [ 1893.081690s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41326}: linkerd_app_core::serve: Connection closed [ 1898.079482s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41398}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1898.079517s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1898.079540s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41398}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41398 [ 1898.079563s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.067µs [ 1898.079574s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1898.079582s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1898.079587s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41404}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1898.079602s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41404}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41404 [ 1898.079619s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: hyper::proto::h1::io: parsed 4 headers [ 1898.079634s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: hyper::proto::h1::conn: incoming body is empty [ 1898.079624s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41398}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1898.079656s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60892 [ 1898.079727s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41404}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1898.079741s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: hyper::proto::h1::io: flushed 107 bytes [ 1898.079764s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1898.079787s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60892}: linkerd_app_core::serve: Connection closed [ 1898.079799s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1898.079799s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41398}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37000 keepalive=None [ 1898.079808s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41398}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1898.079811s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.608µs [ 1898.079816s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1898.079821s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1898.079829s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41404}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37002 keepalive=None [ 1898.079833s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41404}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1898.079834s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: hyper::proto::h1::io: parsed 4 headers [ 1898.079836s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: hyper::proto::h1::conn: incoming body is empty [ 1898.079840s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:60896 [ 1898.079886s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: hyper::proto::h1::io: flushed 106 bytes [ 1898.079909s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1898.079920s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:60896}: linkerd_app_core::serve: Connection closed [ 1898.081415s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41398}: linkerd_app_core::serve: Connection closed [ 1898.081464s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41404}: linkerd_app_core::serve: Connection closed [ 1898.674900s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(379), flags: (0x5: END_HEADERS | END_STREAM) } [ 1898.674962s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1898.675982s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(379), flags: (0x4: END_HEADERS) } [ 1898.676010s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(379), flags: (0x1: END_STREAM) } [ 1899.381154s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:49510}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:49510 [ 1903.079361s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41470}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1903.079394s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41470}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41470 [ 1903.079427s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41472}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1903.079434s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41472}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41472 [ 1903.079457s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41470}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1903.079535s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41472}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1903.079594s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41470}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37070 keepalive=None [ 1903.079608s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41470}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1903.079628s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41472}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37072 keepalive=None [ 1903.079631s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41472}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1903.081217s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41472}: linkerd_app_core::serve: Connection closed [ 1903.081374s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41470}: linkerd_app_core::serve: Connection closed [ 1908.079739s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41552}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1908.079778s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1908.079804s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41552}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41552 [ 1908.079830s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.195µs [ 1908.079852s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1908.079866s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1908.079878s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41558}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1908.079899s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: hyper::proto::h1::io: parsed 4 headers [ 1908.079903s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: hyper::proto::h1::conn: incoming body is empty [ 1908.079903s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41558}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41558 [ 1908.079914s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:32818 [ 1908.079954s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41552}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1908.080023s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: hyper::proto::h1::io: flushed 107 bytes [ 1908.080062s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1908.080091s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32818}: linkerd_app_core::serve: Connection closed [ 1908.080105s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1908.080095s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1908.080140s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=5.421µs [ 1908.080175s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1908.080181s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1908.080202s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: hyper::proto::h1::io: parsed 4 headers [ 1908.080214s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: hyper::proto::h1::conn: incoming body is empty [ 1908.080222s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:32814 [ 1908.080249s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41552}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37154 keepalive=None [ 1908.080272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41552}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1908.080308s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41558}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37156 keepalive=None [ 1908.080324s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41558}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1908.080325s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: hyper::proto::h1::io: flushed 106 bytes [ 1908.080360s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1908.080383s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32814}: linkerd_app_core::serve: Connection closed [ 1908.081739s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41552}: linkerd_app_core::serve: Connection closed [ 1908.081813s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41558}: linkerd_app_core::serve: Connection closed [ 1908.674920s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(381), flags: (0x5: END_HEADERS | END_STREAM) } [ 1908.674972s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1908.675888s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(381), flags: (0x4: END_HEADERS) } [ 1908.675924s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(381), flags: (0x1: END_STREAM) } [ 1909.381777s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:49664}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:49664 [ 1913.078998s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41626}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1913.079035s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41626}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41626 [ 1913.079066s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41624}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1913.079084s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41624}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41624 [ 1913.079120s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41626}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1913.079210s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41624}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1913.079318s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41626}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37224 keepalive=None [ 1913.079340s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41626}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1913.079364s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41624}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37226 keepalive=None [ 1913.079389s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41624}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1913.080918s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41626}: linkerd_app_core::serve: Connection closed [ 1913.080972s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41624}: linkerd_app_core::serve: Connection closed [ 1918.079895s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41700}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1918.079931s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1918.079944s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41700}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41700 [ 1918.079961s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=6.292µs [ 1918.079969s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1918.079975s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1918.079980s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41698}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1918.079990s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41698}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41698 [ 1918.080000s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: hyper::proto::h1::io: parsed 4 headers [ 1918.080008s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: hyper::proto::h1::conn: incoming body is empty [ 1918.080019s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41700}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1918.080021s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:32960 [ 1918.080083s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: hyper::proto::h1::io: flushed 107 bytes [ 1918.080104s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1918.080105s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41698}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1918.080162s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32960}: linkerd_app_core::serve: Connection closed [ 1918.080189s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1918.080199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=3.527µs [ 1918.080207s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1918.080211s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1918.080241s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: hyper::proto::h1::io: parsed 4 headers [ 1918.080248s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: hyper::proto::h1::conn: incoming body is empty [ 1918.080249s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41700}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37300 keepalive=None [ 1918.080259s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41700}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1918.080260s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:32966 [ 1918.080276s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41698}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37302 keepalive=None [ 1918.080279s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41698}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1918.080362s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: hyper::proto::h1::io: flushed 106 bytes [ 1918.080385s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1918.080397s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:32966}: linkerd_app_core::serve: Connection closed [ 1918.081657s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41698}: linkerd_app_core::serve: Connection closed [ 1918.081703s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41700}: linkerd_app_core::serve: Connection closed [ 1918.675274s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(383), flags: (0x5: END_HEADERS | END_STREAM) } [ 1918.675322s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1918.676440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(383), flags: (0x4: END_HEADERS) } [ 1918.676468s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(383), flags: (0x1: END_STREAM) } [ 1919.384676s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:49814}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:49814 [ 1923.079754s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41762}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1923.079801s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41762}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41762 [ 1923.079848s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41764}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1923.079862s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41764}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41764 [ 1923.079886s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41762}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1923.079957s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41764}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1923.080026s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41762}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37362 keepalive=None [ 1923.080040s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41762}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1923.080066s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41764}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37364 keepalive=None [ 1923.080071s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41764}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1923.081679s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41762}: linkerd_app_core::serve: Connection closed [ 1923.081730s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41764}: linkerd_app_core::serve: Connection closed [ 1928.079299s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41840}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1928.079350s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1928.079361s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41840}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41840 [ 1928.079377s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.595µs [ 1928.079386s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1928.079393s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1928.079411s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41842}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1928.079432s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41842}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41842 [ 1928.079421s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: hyper::proto::h1::io: parsed 4 headers [ 1928.079463s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: hyper::proto::h1::conn: incoming body is empty [ 1928.079475s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33110 [ 1928.079481s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1928.079602s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: hyper::proto::h1::io: flushed 107 bytes [ 1928.079621s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41842}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1928.079646s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1928.079674s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33110}: linkerd_app_core::serve: Connection closed [ 1928.079692s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1928.079703s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41840}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37444 keepalive=None [ 1928.079714s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41840}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1928.079716s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.784µs [ 1928.079730s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1928.079738s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1928.079753s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41842}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37446 keepalive=None [ 1928.079771s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41842}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1928.079773s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: hyper::proto::h1::io: parsed 4 headers [ 1928.079778s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: hyper::proto::h1::conn: incoming body is empty [ 1928.079786s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33102 [ 1928.079888s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: hyper::proto::h1::io: flushed 106 bytes [ 1928.079928s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1928.079948s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33102}: linkerd_app_core::serve: Connection closed [ 1928.081362s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41842}: linkerd_app_core::serve: Connection closed [ 1928.081579s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41840}: linkerd_app_core::serve: Connection closed [ 1928.674547s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(385), flags: (0x5: END_HEADERS | END_STREAM) } [ 1928.674612s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1928.675535s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(385), flags: (0x4: END_HEADERS) } [ 1928.675562s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(385), flags: (0x1: END_STREAM) } [ 1929.385342s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:49958}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:49958 [ 1933.079726s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41924}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1933.079772s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41924}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41924 [ 1933.079811s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41922}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1933.079821s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41922}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41922 [ 1933.079855s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41924}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1933.079932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41922}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1933.080018s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41924}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37522 keepalive=None [ 1933.080038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41924}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1933.080077s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41922}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37524 keepalive=None [ 1933.080092s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41922}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1933.081892s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41922}: linkerd_app_core::serve: Connection closed [ 1933.082021s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41924}: linkerd_app_core::serve: Connection closed [ 1938.079309s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41998}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1938.079350s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1938.079357s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41998}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:41998 [ 1938.079378s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=7.955µs [ 1938.079388s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1938.079394s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1938.079394s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42000}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1938.079402s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42000}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42000 [ 1938.079422s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: hyper::proto::h1::io: parsed 4 headers [ 1938.079440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: hyper::proto::h1::conn: incoming body is empty [ 1938.079424s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41998}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1938.079450s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33264 [ 1938.079516s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42000}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1938.079530s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: hyper::proto::h1::io: flushed 106 bytes [ 1938.079555s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1938.079577s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33264}: linkerd_app_core::serve: Connection closed [ 1938.079577s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41998}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37600 keepalive=None [ 1938.079585s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41998}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1938.079590s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1938.079602s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.288µs [ 1938.079605s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42000}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37602 keepalive=None [ 1938.079607s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1938.079609s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42000}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1938.079615s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1938.079632s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: hyper::proto::h1::io: parsed 4 headers [ 1938.079635s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: hyper::proto::h1::conn: incoming body is empty [ 1938.079642s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33266 [ 1938.079702s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: hyper::proto::h1::io: flushed 107 bytes [ 1938.079722s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1938.079736s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33266}: linkerd_app_core::serve: Connection closed [ 1938.081401s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42000}: linkerd_app_core::serve: Connection closed [ 1938.081437s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:41998}: linkerd_app_core::serve: Connection closed [ 1938.675246s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(387), flags: (0x5: END_HEADERS | END_STREAM) } [ 1938.675302s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1938.676223s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(387), flags: (0x4: END_HEADERS) } [ 1938.676257s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(387), flags: (0x1: END_STREAM) } [ 1939.386038s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:50110}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:50110 [ 1943.078909s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42070}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1943.078948s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42070}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42070 [ 1943.078991s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42072}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1943.079008s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42072}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42072 [ 1943.079038s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42070}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1943.079158s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42072}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1943.079224s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42070}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37668 keepalive=None [ 1943.079233s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42070}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1943.079353s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42072}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37670 keepalive=None [ 1943.079370s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42072}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1943.080843s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42070}: linkerd_app_core::serve: Connection closed [ 1943.080897s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42072}: linkerd_app_core::serve: Connection closed [ 1948.079024s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42142}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1948.079079s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42142}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42142 [ 1948.079085s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1948.079115s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=9.368µs [ 1948.079123s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1948.079152s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1948.079148s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42150}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1948.079164s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42150}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42150 [ 1948.079185s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: hyper::proto::h1::io: parsed 4 headers [ 1948.079189s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: hyper::proto::h1::conn: incoming body is empty [ 1948.079199s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33406 [ 1948.079206s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42142}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1948.079304s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: hyper::proto::h1::io: flushed 107 bytes [ 1948.079322s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42150}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1948.079341s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1948.079367s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33406}: linkerd_app_core::serve: Connection closed [ 1948.079380s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1948.079392s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.369µs [ 1948.079396s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1948.079401s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1948.079403s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42142}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37746 keepalive=None [ 1948.079414s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42142}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1948.079418s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: hyper::proto::h1::io: parsed 4 headers [ 1948.079420s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: hyper::proto::h1::conn: incoming body is empty [ 1948.079426s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33404 [ 1948.079442s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42150}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37748 keepalive=None [ 1948.079447s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42150}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1948.079493s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: hyper::proto::h1::io: flushed 106 bytes [ 1948.079513s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1948.079530s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33404}: linkerd_app_core::serve: Connection closed [ 1948.081035s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42150}: linkerd_app_core::serve: Connection closed [ 1948.081112s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42142}: linkerd_app_core::serve: Connection closed [ 1948.675114s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(389), flags: (0x5: END_HEADERS | END_STREAM) } [ 1948.675192s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1948.676222s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(389), flags: (0x4: END_HEADERS) } [ 1948.676253s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(389), flags: (0x1: END_STREAM) } [ 1949.388763s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:50252}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:50252 [ 1953.079639s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42208}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1953.079680s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42208}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42208 [ 1953.079728s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42210}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1953.079738s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42210}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42210 [ 1953.079767s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42208}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1953.079873s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42210}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1953.079957s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42208}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37808 keepalive=None [ 1953.079975s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42208}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1953.080002s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42210}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37810 keepalive=None [ 1953.080008s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42210}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1953.081563s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42208}: linkerd_app_core::serve: Connection closed [ 1953.081621s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42210}: linkerd_app_core::serve: Connection closed [ 1958.079371s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42286}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1958.079411s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42286}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42286 [ 1958.079412s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: linkerd_tls::server: Peeked bytes from TCP stream sz=107 [ 1958.079440s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=8.015µs [ 1958.079449s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1958.079446s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42288}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1958.079454s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42288}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42288 [ 1958.079458s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1958.079484s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42286}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1958.079493s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: hyper::proto::h1::io: parsed 4 headers [ 1958.079498s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: hyper::proto::h1::conn: incoming body is empty [ 1958.079511s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33548 [ 1958.079568s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42288}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1958.079590s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: hyper::proto::h1::io: flushed 106 bytes [ 1958.079618s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1958.079637s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33548}: linkerd_app_core::serve: Connection closed [ 1958.079638s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42286}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37890 keepalive=None [ 1958.079670s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: linkerd_tls::server: Peeked bytes from TCP stream sz=108 [ 1958.079676s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42286}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1958.079684s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: linkerd_detect: DetectResult protocol=Some(Http1) elapsed=4.759µs [ 1958.079695s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: linkerd_proxy_http::server: Creating HTTP service version=Http1 [ 1958.079701s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: linkerd_proxy_http::server: Handling as HTTP version=Http1 [ 1958.079706s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42288}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37892 keepalive=None [ 1958.079717s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: hyper::proto::h1::io: parsed 4 headers [ 1958.079718s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42288}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1958.079720s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: hyper::proto::h1::conn: incoming body is empty [ 1958.079766s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(NoClientHello) client=10.244.7.1:33556 [ 1958.079844s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: hyper::proto::h1::io: flushed 107 bytes [ 1958.079877s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: linkerd_proxy_http::server: The client is shutting down the connection res=Ok(()) [ 1958.079895s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.7.1:33556}: linkerd_app_core::serve: Connection closed [ 1958.081338s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42288}: linkerd_app_core::serve: Connection closed [ 1958.081389s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42286}: linkerd_app_core::serve: Connection closed [ 1958.675068s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_read: received frame=Headers { stream_id: StreamId(391), flags: (0x5: END_HEADERS | END_STREAM) } [ 1958.675121s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}: linkerd_app_inbound::policy::authorize::http: Request authorized permit=ServerPermit { dst: OrigDstAddr(0.0.0.0:4191), protocol: Detect { timeout: 10s }, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=Some(Established { client_id: Some(ClientId(Name("prometheus.linkerd-viz.serviceaccount.identity.linkerd.cluster.local"))), negotiated_protocol: None }) client=10.244.1.61:43088 [ 1958.676051s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Headers { stream_id: StreamId(391), flags: (0x4: END_HEADERS) } [ 1958.676079s] DEBUG ThreadId(02) daemon:admin{listen.addr=0.0.0.0:4191}:accept{client.addr=10.244.1.61:43088}:Connection{peer=Server}: h2::codec::framed_write: send frame=Data { stream_id: StreamId(391), flags: (0x1: END_STREAM) } [ 1959.389458s] WARN ThreadId(01) outbound:accept{client.addr=10.244.7.14:50402}: linkerd_app_core::serve: Server failed to become ready error=buffered service failed: buffered service failed: task 1287 panicked error.sources=[buffered service failed: task 1287 panicked, task 1287 panicked] client.addr=10.244.7.14:50402 [ 1963.079963s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 2, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1963.080005s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42366 [ 1963.080045s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}: linkerd_app_inbound::accept: Accepted policy=AllowPolicy { dst: OrigDstAddr(10.244.7.14:9000), server: Cached { inner: Receiver { shared: Shared { value: RwLock(PhantomData, RwLock { data: ServerPolicy { protocol: Opaque, authorizations: [Authorization { networks: [Network { net: 0.0.0.0/0, except: [] }, Network { net: ::/0, except: [] }], authentication: Unauthenticated, meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } }, Authorization { networks: [Network { net: 127.0.0.1/32, except: [] }, Network { net: ::1/128, except: [] }], authentication: Unauthenticated, meta: Meta { group: "default", kind: "default", name: "localhost" } }], meta: Meta { group: "", kind: "default", name: "all-unauthenticated" } } }), state: AtomicState(2), ref_count_rx: 3, notify_rx: Notify { state: 4, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: None, tail: None } }) }, notify_tx: Notify { state: 1, waiters: Mutex(PhantomData, Mutex { data: LinkedList { head: Some(0x7f8fc56c3178), tail: Some(0x7f8fc56c3178) } }) } }, version: Version(0) }, handle: None } } [ 1963.080060s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}: linkerd_app_inbound::policy::authorize::tcp: Connection authorized permit=ServerPermit { dst: OrigDstAddr(10.244.7.14:9000), protocol: Opaque, labels: ServerAuthzLabels { server: ServerLabel(Meta { group: "", kind: "default", name: "all-unauthenticated" }), authz: Meta { group: "", kind: "default", name: "all-unauthenticated" } } } tls=None(PortSkipped) client=10.244.7.1:42364 [ 1963.080092s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1963.080199s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connecting server.addr=10.244.7.14:9000 [ 1963.080272s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37964 keepalive=None [ 1963.080295s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1963.080321s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}:tcp:tcp: linkerd_proxy_transport::connect: Connected local.addr=10.244.7.14:37966 keepalive=None [ 1963.080333s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}:server{port=9000}:tcp:tcp: linkerd_transport_metrics::client: client connection open [ 1963.081820s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42364}: linkerd_app_core::serve: Connection closed [ 1963.081932s] DEBUG ThreadId(01) inbound:accept{client.addr=10.244.7.1:42366}: linkerd_app_core::serve: Connection closed