] [php7:notice] [pid 464667] [client 136.143.177.44:49750] PHP Warning: count(): Parameter must be an array or an object that implements Countable in /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php on line 1437 [Sun Dec 14 07:13:59.115207 2025] [php7:notice] [pid 464667] [client 136.143.177.44:49750] PHP Stack trace: [Sun Dec 14 07:13:59.115212 2025] [php7:notice] [pid 464667] [client 136.143.177.44:49750] PHP 1. {main}() /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php:0 [Sun Dec 14 07:13:59.115217 2025] [php7:notice] [pid 464667] [client 136.143.177.44:49750] PHP Warning: count(): Parameter must be an array or an object that implements Countable in /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php on line 1439 [Sun Dec 14 07:13:59.115220 2025] [php7:notice] [pid 464667] [client 136.143.177.44:49750] PHP Stack trace: [Sun Dec 14 07:13:59.115224 2025] [php7:notice] [pid 464667] [client 136.143.177.44:49750] PHP 1. {main}() /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php:0 [Sun Dec 14 07:28:21.655907 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP Notice: Undefined property: stdClass::$data in /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php on line 338 [Sun Dec 14 07:28:21.655943 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP Stack trace: [Sun Dec 14 07:28:21.655950 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP 1. {main}() /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php:0 [Sun Dec 14 07:28:22.831277 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP Warning: count(): Parameter must be an array or an object that implements Countable in /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php on line 1437 [Sun Dec 14 07:28:22.831306 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP Stack trace: [Sun Dec 14 07:28:22.831313 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP 1. {main}() /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php:0 [Sun Dec 14 07:28:22.832674 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP Notice: A non well formed numeric value encountered in /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php on line 2567 [Sun Dec 14 07:28:22.832679 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP Stack trace: [Sun Dec 14 07:28:22.832683 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP 1. {main}() /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php:0 [Sun Dec 14 07:28:22.832688 2025] [php7:notice] [pid 462833] [client 136.143.177.44:50078] PHP 2. number_format() /var/www/html/aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php:2567 [Sun Dec 14 09:04:05.756651 2025] [php7:error] [pid 463142] [client 192.238.247.144:53571] script '/var/www/html/xmlrpc.php' not found or unable to stat [Sun Dec 14 09:50:07.977801 2025] [core:error] [pid 462832] [client 156.226.28.178:36616] AH00126: Invalid URI in request POST /cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/bin/sh HTTP/1.1 [Sun Dec 14 11:01:17.300568 2025] [php7:error] [pid 462911] [client 4.241.241.191:64747] script '/var/www/html/404.php' not found or unable to stat, referer: https://duckduckgo.com/ [Sun Dec 14 11:01:17.456062 2025] [php7:error] [pid 462911] [client 4.241.241.191:64747] script '/var/www/html/aa.php' not found or unable to stat, referer: https://www.yahoo.com/ [Sun Dec 14 11:01:17.612192 2025] [php7:error] [pid 462911] [client 4.241.241.191:64747] script '/var/www/html/abcd.php' not found or unable to stat, referer: https://www.yahoo.com/ [Sun Dec 14 11:01:17.767577 2025] [php7:error] [pid 462911] [client 4.241.241.191:64747] script '/var/www/html/admin.php' not found or unable to stat, referer: https://duckduckgo.com/ [Sun Dec 14 11:01:17.922850 2025] [php7:error] [pid 462911] [client 4.241.241.191:64747] script '/var/www/html/about.php' not found or unable to stat, referer: https://www.google.fr/ [Sun Dec 14 11:01:18.078405 2025] [php7:error] [pid 462911] [client 4.241.241.191:64747] script '/var/www/html/a333644&pAuthTokenZB=&pInvoiceID=3164394000037836043&pLang=1&pCiaName=AROCHI+%26+LINDNER%2C+S.L.&pCiaAddr1=C%2FGurtubay%2C+6%2C3%C2%B0+Izqda+&pCiaAddr2=28001+Madrid+SPAIN&pCiaAddr3=ESB87035168&pInvNumber=ESP-005288&pCurrentDate=14-Dec-25&pDatPac=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 HTTP/1.1" 200 4090 "-" "Deluge" 136.143.177.44 - - [14/Dec/2025:07:28:20 -0600] "GET /aptusCFDIRF/wsPreBillZB_Moderno_Arochi.php?pRecordId=4069147000051476064&pAuthToken=&pAppName=alate-espana&pOrgaID=774333644&pAuthTokenZB=&pInvoiceID=3164394000037859039&pLang=1&pCiaName=AROCHI+%26+LINDNER%2C+S.L.&pCiaAddr1=C%2FGurtubay%2C+6%2C3%C2%B0+Izqda+&pCiaAddr2=28001+Madrid+SPAIN&pCiaAddr3=ESB87035168&pInvNumber=ESP-005289&pCurrentDate=14-Dec-25&pDatPac=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 HTTP/1.1" 200 4090 "-" "Deluge" 182.8.227.5 - - [14/Dec/2025:07:30:01 -0600] "GET /sftp-config.json HTTP/1.1" 404 498 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0" 182.8.227.5 - - [14/Dec/2025:07:30:02 -0600] "GET /.vscode/sftp.json HTTP/1.1" 200 558 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0" 182.8.227.5 - - [14/Dec/2025:07:31:15 -0600] "GET /sftp-config.json HTTP/1.1" 404 493 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0" 182.8.227.5 - - [14/Dec/2025:07:31:15 -0600] "GET /.vscode/sftp.json HTTP/1.1" 200 558 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0" 136.143.176.60 - - [14/Dec/2025:07:45:04 -0600] "GET /PCI-test/fetch_trademark_csv.php HTTP/1.1" 200 4030 "-" "Apache-HttpClient/4.5.13 (Java/17.0.17)" 136.143.176.60 - - [14/Dec/2025:07:56:33 -0600] "GET /PCI-test/trademarks.csv HTTP/1.1" 200 37168000 "-" "Zoho_Analytics" 66.132.153.113 - - [14/Dec/2025:07:57:02 -0600] "GET / HTTP/1.1" 200 7154 "-" "Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)" 167.71.141.175 - - [14/Dec/2025:07:58:05 -0600] "GET / HTTP/1.1" 200 3477 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36" 167.71.141.175 - - [14/Dec/2025:07:58:05 -0600] "GET /favicon.ico HTTP/1.1" 404 493 "http://aptuslegal.app/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36" 167.71.141.175 - - [14/Dec/2025:07:58:06 -0600] "GET / HTTP/1.1" 200 7246 "-" "Mozilla/5.0 (X11; Linux x86_64; rv:142.0) Gecko/20100101 Firefox/142.0" 167.71.141.175 - - [14/Dec/2025:07:58:08 -0600] "GET /fc 14 07:59:41 ip-172-31-29-215 sshd[466675]: error: maximum authentication attempts exceeded for invalid user oracle from 171.241.38.246 port 40733 ssh2 [preauth] Dec 14 07:59:41 ip-172-31-29-215 sshd[466675]: Disconnecting invalid user oracle 171.241.38.246 port 40733: Too many authentication failures [preauth] Dec 14 07:59:47 ip-172-31-29-215 sshd[466677]: Invalid user oracle from 171.241.38.246 port 40865 Dec 14 07:59:48 ip-172-31-29-215 sshd[466677]: Received disconnect from 171.241.38.246 port 40865:11: disconnected by user [preauth] Dec 14 07:59:48 ip-172-31-29-215 sshd[466677]: Disconnected from invalid user oracle 171.241.38.246 port 40865 [preauth] Dec 14 07:59:55 ip-172-31-29-215 sshd[466679]: Invalid user usuario from 171.241.38.246 port 40954 Dec 14 07:59:56 ip-172-31-29-215 sshd[466679]: error: maximum authentication attempts exceeded for invalid user usuario from 171.241.38.246 port 40954 ssh2 [preauth] Dec 14 07:59:56 ip-172-31-29-215 sshd[466679]: Disconnecting invalid user usuario 171.241.38.246 port 40954: Too many authentication failures [preauth] Dec 14 08:00:01 ip-172-31-29-215 CRON[466685]: pam_unix(cron:session): session opened for user smmsp by (uid=0) Dec 14 08:00:01 ip-172-31-29-215 CRON[466685]: pam_unix(cron:session): session closed for user smmsp Dec 14 08:00:04 ip-172-31-29-215 sshd[466681]: Invalid user usuario from 171.241.38.246 port 41109 Dec 14 08:00:05 ip-172-31-29-215 sshd[466681]: error: maximum authentication attempts exceeded for invalid user usuario from 171.241.38.246 port 41109 ssh2 [preauth] Dec 14 08:00:05 ip-172-31-29-215 sshd[466681]: Disconnecting invalid user usuario 171.241.38.246 port 41109: Too many authentication failures [preauth] Dec 14 08:00:12 ip-172-31-29-215 sshd[466707]: Invalid user usuario from 171.241.38.246 port 41244 Dec 14 08:00:13 ip-172-31-29-215 sshd[466707]: Received disconnect from 171.241.38.246 port 41244:11: disconnected by user [preauth] Dec 14 08:00:13 ip-172-31-29-215 sshd[466707]: Disconnected from invalid user usuario 171.241.38.246 port 41244 [preauth] Dec 14 08:00:20 ip-172-31-29-215 sshd[466709]: Invalid user test from 171.241.38.246 port 41348 Dec 14 08:00:21 ip-172-31-29-215 sshd[466711]: Invalid user spectrum from 103.153.190.105 port 48021 Dec 14 08:00:21 ip-172-31-29-215 sshd[466711]: Received disconnect from 103.153.190.105 port 48021:11: Bye Bye [preauth] Dec 14 08:00:21 ip-172-31-29-215 sshd[466711]: Disconnected from invalid user spectrum 103.153.190.105 port 48021 [preauth] Dec 14 08:00:21 ip-172-31-29-215 sshd[466709]: error: maximum authentication attempts exceeded for invalid user test from 171.241.38.246 port 41348 ssh2 [preauth] Dec 14 08:00:21 ip-172-31-29-215 sshd[466709]: Disconnecting invalid user test 171.241.38.246 port 41348: Too many authentication failures [preauth] Dec 14 08:00:29 ip-172-31-29-215 sshd[466713]: Invalid user test from 171.241.38.246 port 41485 Dec 14 08:00:30 ip-172-31-29-215 sshd[466713]: error: maximum authentication attempts exceeded for invalid user test from 171.241.38.246 port 41485 ssh2 [preauth] Dec 14 08:00:30 ip-172-31-29-215 sshd[466713]: Disconnecting invalid user test 171.241.38.246 port 41485: Too many authentication failures [preauth] Dec 14 08:00:38 ip-172-31-29-215 sshd[466715]: Invalid user test from 171.241.38.246 port 41628 Dec 14 08:00:39 ip-172-31-29-215 sshd[466715]: Received disconnect from 171.241.38.246 port 41628:11: disconnected by user [preauth] Dec 14 08:00:39 ip-172-31-29-215 sshd[466715]: Disconnected from invalid user test 171.241.38.246 port 41628 [preauth] Dec 14 08:00:40 ip-172-31-29-215 sshd[466683]: Received disconnect from 45.78.218.148 port 50190:11: Bye Bye [preauth] Dec 14 08:00:40 ip-172-31-29-215 sshd[466683]: Disconnected from 45.78.218.148 port 50190 [preauth] Dec 14 08:00:46 ip-172-31-29-215 sshd[466717]: Invalid user user from 171.241.38.246 port 41756 Dec 14 08:00:47 ip-172-31-29-215 sshd[466717]: error: maximum authentication attempts exceeded for invalid user user from 171.241.38.246 port 41756 ssh2 [preauth] Dec 14 08:00:47 ip-172-31-29-215 sshd[466m authenticating user root 103.153.190.105 port 58455 [preauth] Dec 14 08:13:03 ip-172-31-29-215 sshd[466833]: Invalid user nlp from 103.153.190.105 port 56487 Dec 14 08:13:03 ip-172-31-29-215 sshd[466833]: Received disconnect from 103.153.190.105 port 56487:11: Bye Bye [preauth] Dec 14 08:13:03 ip-172-31-29-215 sshd[466833]: Disconnected from invalid user nlp 103.153.190.105 port 56487 [preauth] Dec 14 08:15:11 ip-172-31-29-215 sshd[466835]: Invalid user vpnuser from 103.153.190.105 port 56201 Dec 14 08:15:11 ip-172-31-29-215 sshd[466835]: Received disconnect from 103.153.190.105 port 56201:11: Bye Bye [preauth] Dec 14 08:15:11 ip-172-31-29-215 sshd[466835]: Disconnected from invalid user vpnuser 103.153.190.105 port 56201 [preauth] Dec 14 08:17:01 ip-172-31-29-215 CRON[466837]: pam_unix(cron:session): session opened for user root by (uid=0) Dec 14 08:17:01 ip-172-31-29-215 CRON[466837]: pam_unix(cron:session): session closed for user root Dec 14 08:17:18 ip-172-31-29-215 sshd[466840]: Invalid user boss from 103.153.190.105 port 55386 Dec 14 08:17:19 ip-172-31-29-215 sshd[466840]: Received disconnect from 103.153.190.105 port 55386:11: Bye Bye [preauth] Dec 14 08:17:19 ip-172-31-29-215 sshd[466840]: Disconnected from invalid user boss 103.153.190.105 port 55386 [preauth] Dec 14 08:19:29 ip-172-31-29-215 sshd[466845]: Received disconnect from 103.153.190.105 port 56385:11: Bye Bye [preauth] Dec 14 08:19:29 ip-172-31-29-215 sshd[466845]: Disconnected from authenticating user root 103.153.190.105 port 56385 [preauth] Dec 14 08:20:01 ip-172-31-29-215 CRON[466847]: pam_unix(cron:session): session opened for user smmsp by (uid=0) Dec 14 08:20:01 ip-172-31-29-215 CRON[466847]: pam_unix(cron:session): session closed for user smmsp Dec 14 08:21:32 ip-172-31-29-215 sshd[466869]: Invalid user kserge from 103.153.190.105 port 48721 Dec 14 08:21:32 ip-172-31-29-215 sshd[466869]: Received disconnect from 103.153.190.105 port 48721:11: Bye Bye [preauth] Dec 14 08:21:32 ip-172-31-29-215 sshd[466869]: Disconnected from invalid user kserge 103.153.190.105 port 48721 [preauth] Dec 14 08:23:33 ip-172-31-29-215 sshd[466872]: Invalid user joe from 103.153.190.105 port 42103 Dec 14 08:23:33 ip-172-31-29-215 sshd[466872]: Received disconnect from 103.153.190.105 port 42103:11: Bye Bye [preauth] Dec 14 08:23:33 ip-172-31-29-215 sshd[466872]: Disconnected from invalid user joe 103.153.190.105 port 42103 [preauth] Dec 14 08:25:41 ip-172-31-29-215 sshd[466875]: Invalid user oracle from 103.153.190.105 port 59163 Dec 14 08:25:41 ip-172-31-29-215 sshd[466875]: Received disconnect from 103.153.190.105 port 59163:11: Bye Bye [preauth] Dec 14 08:25:41 ip-172-31-29-215 sshd[466875]: Disconnected from invalid user oracle 103.153.190.105 port 59163 [preauth] Dec 14 08:27:46 ip-172-31-29-215 sshd[466877]: Received disconnect from 103.153.190.105 port 49947:11: Bye Bye [preauth] Dec 14 08:27:46 ip-172-31-29-215 sshd[466877]: Disconnected from authenticating user root 103.153.190.105 port 49947 [preauth] Dec 14 08:29:52 ip-172-31-29-215 sshd[466882]: Invalid user mikrotik from 103.153.190.105 port 45303 Dec 14 08:29:52 ip-172-31-29-215 sshd[466882]: Received disconnect from 103.153.190.105 port 45303:11: Bye Bye [preauth] Dec 14 08:29:52 ip-172-31-29-215 sshd[466882]: Disconnected from invalid user mikrotik 103.153.190.105 port 45303 [preauth] Dec 14 08:32:06 ip-172-31-29-215 sshd[466886]: Received disconnect from 103.153.190.105 port 48944:11: Bye Bye [preauth] Dec 14 08:32:06 ip-172-31-29-215 sshd[466886]: Disconnected from authenticating user ubuntu 103.153.190.105 port 48944 [preauth] Dec 14 08:34:08 ip-172-31-29-215 sshd[466888]: Invalid user testuser from 103.153.190.105 port 45022 Dec 14 08:34:08 ip-172-31-29-215 sshd[466888]: Received disconnect from 103.153.190.105 port 45022:11: Bye Bye [preauth] Dec 14 08:34:08 ip-172-31-29-215 sshd[466888]: Disconnected from invalid user testuser 103.153.190.105 port 45022 [preauth] Dec 14 08:36:09 ip-172-31-29-215 sshd[466890]: Received disconnect from 103.153.190.105 port 36697:11: Bye Bye [preauth] Dec 14 08:315 amazon-ssm-agent.amazon-ssm-agent[3122439]: 2025-12-14 08:49:30.8922 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Dec 14 08:49:30 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[3122439]: 2025-12-14 08:49:30.9339 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Dec 14 08:49:30 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[3122439]: #011status code: 400, request id: b10a800c-9995-4159-af11-a221d66a31bb Dec 14 09:00:01 ip-172-31-29-215 CRON[467008]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Dec 14 09:09:01 ip-172-31-29-215 CRON[467049]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Dec 14 09:09:12 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Dec 14 09:09:12 ip-172-31-29-215 sessionclean[467063]: Cannot load Xdebug - it was already loaded Dec 14 09:09:12 ip-172-31-29-215 sessionclean[467063]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0 Dec 14 09:09:12 ip-172-31-29-215 sessionclean[467063]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0 Dec 14 09:09:12 ip-172-31-29-215 sessionclean[467063]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0 Dec 14 09:09:12 ip-172-31-29-215 sessionclean[467063]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0 Dec 14 09:09:12 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded. Dec 14 09:09:12 ip-172-31-29-215 systemd[1]: Finished Clean php session files. Dec 14 09:17:01 ip-172-31-29-215 CRON[467128]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly) Dec 14 09:19:14 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[3122439]: 2025-12-14 09:19:14.9784 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found Dec 14 09:19:15 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[3122439]: 2025-12-14 09:19:15.0289 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084 Dec 14 09:19:15 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[3122439]: #011status code: 400, request id: b67a5355-647d-4bb1-bbb0-28ee7c8b3a5c Dec 14 09:20:01 ip-172-31-29-215 CRON[467135]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp) Dec 14 09:31:33 ip-172-31-29-215 systemd[1]: Starting Certbot... Dec 14 09:31:34 ip-172-31-29-215 systemd[1]: certbot.service: Succeeded. Dec 14 09:31:34 ip-172-31-29-215 systemd[1]: Finished Certbot. Dec 14 09:39:01 ip-172-31-29-215 CRON[467181]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi) Dec 14 09:39:07 ip-172-31-29-215 systemd[1]: Starting Clean php session files... Dec 14 09:39:07 ip-172-31-29-215 sessionclean[467194]: Cannot load Xdebug - it was already loaded Dec 14 09:39:07 ip-172-31-29-215 sessionclean[467194]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.{"data":{"auth":{"last-id":0,"users":null,"device":{"brand":"canonical","model":"aws-classic","serial":"d54ba04a-695c-4c8a-80be-19b0df80cf46","key-id":"iJU_vyejSQtLnAQVmtHHq9RX72Jb40JMWVv9GgpJ6311Gr12A8_tSCoURR6sJoZ0","session-macaroon":"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"}},"config":{"core":{"cloud":{"availability-zone":"us-east-2b","name":"aws","region":"us-east-2"},"refresh":{},"seed":{"loaded":true}}},"conns":{"lxd:lxd-support core:lxd-support":{"auto":true,"interface":"lxd-support"},"lxd:network core:network":{"auto":true,"interface":"network"},"lxd:network-bind core:network-bind":{"auto":true,"interface":"network-bind"},"lxd:system-observe core:system-observe":{"auto":true,"interface":"system-observe"}},"last-refresh":"2025-12-14T12:29:13.223572614-06:00","last-refresh-hints":"2021-04-23T00:34:45.749036127Z","patch-level":6,"patch-sublevel":3,"patch-sublevel-last-version":"2.72","preseed-start-time":"2021-02-23T23:49:58.007053445Z","preseed-system-key":{"version":10,"build-id":"f6f929161ff75b7a83d57ee39a7c90d07b5010fa","apparmor-features":["caps","dbus","domain","file","mount","namespaces","network","network_v8","policy","ptrace","query","rlimit","signal"],"apparmor-parser-mtime":1589907589,"apparmor-parser-features":["unsafe"],"nfs-home":false,"overlay-root":"","seccomp-features":["allow","errno","kill_process","kill_thread","log","trace","trap","user_notif"],"seccomp-compiler-version":"2ccd1210af99a0998eaddbf01a74535f222c148f 2.4.3 9b218ef9a4e508dd8a7f848095cb8875d10a4bf28428ad81fdc3f8dac89108f7 bpf-actlog","cgroup-version":"1"},"preseed-time":"2021-02-23T23:50:04.446239096Z","preseeded":true,"refresh-candidates":{},"refresh-privacy-key":"g704FHcv0Pckm3nj","seed-restart-system-key":{"version":10,"build-id":"f6f929161ff75b7a83d57ee39a7c90d07b5010fa","apparmor-features":["caps","dbus","domain","file","mount","namespaces","network","network_v8","policy","ptrace","query","rlimit","signal"],"apparmor-parser-mtime":1589907589,"apparmor-parser-features":["unsafe"],"nfs-home":false,"overlay-root":"","seccomp-features":["allow","errno","kill_process","kill_thread","log","trace","trap","user_notif"],"seccomp-compiler-version":"2ccd1210af99a0998eaddbf01a74535f222c148f 2.4.3 9b218ef9a4e508dd8a7f848095cb8875d10a4bf28428ad81fdc3f8dac89108f7 bpf-actlog","cgroup-version":"1"},"seed-restart-time":"2021-04-23T00:34:45.451530228Z","seed-time":"2021-04-23T00:34:48.134686428Z","seeded":true,"seeded-systems":[{"system":"","model":"aws-classic","brand-id":"canonical","revision":0,"timestamp":"2018-03-28T00:00:00Z","seed-time":"2021-04-23T00:34:48.134686428Z"}],"snap-cookies":{"5e51KAapWFH2S6Pq1_k5pj38kDCJfBGZwj4Lccy9-4ZzKV4QK38Q":"core22","9Ik8_T1g-vkB36qtEVtFHQ26GEq_1MVDiz64viTuob-kh7QJ-bXp":"core18","EgCCiF-EA1LESrzE6f7eWTsNNarEnFo4zqZZpgEm0KEs24FOYGDp":"snapd","MCsSyQl6v8ejlpGpqXRE4xUuBmjFcy7BylqrohPSDnR2hEgomXrT":"core20","plf6ZN7S7plAWwR473QRPz37i90mVRnKUR7Q6hYe4Ja1rFrT7wqj":"lxd","qJXNu_kWACy61RpAISymmAAH01SCjAM7rFrMKIMjCjTTeTWvkFng":"amazon-ssm-agent"},"snapd-snap-cve-2021-44731-vuln-removed":true,"snapd-snap-cve-2022-3328-vuln-removed":true,"snaps":{"amazon-ssm-agent":{"type":"app","sequence":[{"name":"amazon-ssm-agent","snap-id":"T09mpujiTnzSdSCuqNkE7YXXTWDq13tC","revision":"11320","channel":"latest/stable","links":{"contact":["https://aws.amazon.com/contact-us/"],"website":["https://docs.aws.amazon.com/systems-manager/"]},"contact":"https://aws.amazon.com/contact-us/","title":"amazon-ssm-agent","summary":"Agent to enable remote management of your Amazon EC2 instance configuration","description":"The SSM Agent runs on EC2 instances and enables you to quickly and easily\nexecute remote commands or scripts against one or more instances. The agent\nuses SSM documents. When you execute a command, the agent on the instance\nprocesses the document and configures the instance as specified. Currently,\nthe SSM Agent and Run Command enable you to quickly run Shell scripts on an\ninstance using the AWS-RunShellScript SSM document."},{"name":"amazon-ssm-agent","snap-id":"T09mpujiTnzSdSCuqNkE7YXXTWDq13tC","revision":"11797","channel":"latest/stable","links":{"contact":["https://aws.amazon.com/contact-us/"],"website":["https://docs.aws.amazon.com/systems-manager/"]},"contact":"https://aws.amazon.com/contact-us/","title":"amazon-ssm-agent","summary":"Agent to enable remote management of your Amazon EC2 instance configuration","description":"The SSM Agent runs on EC2 instances and enables you to quickly and easily\nexecute remote commands or scripts against one or more instances. The agent\nuses SSM documents. When you execute a command, the agent on the instance\nprocesses the document and configures the instance as specified. Currently,\nthe SSM Agent and Run Command enable you to quickly run Shell scripts on an\ninstance using the AWS-RunShellScript SSM document."}],"active":true,"current":"11797","channel":"latest/stable/ubuntu-20.04","classic":true,"aliases":{"ssm-cli":{"auto":"ssm-cli"}},"last-refresh-time":"2025-08-11T09:29:02.627295504-06:00"},"core18":{"type":"base","sequence":[{"name":"core18","snap-id":"CSO04Jhav2yK0uz97cr0ipQRyqg0qQL6","revision":"2959","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/core18/issues"],"source":["https://github.com/snapcore/core18"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/core18/issues","title":"Core 18 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core18 base snap provides a runtime environment based on Ubuntu 18.04 LTS (Bionic Beaver).\n\nOther Ubuntu environment base snaps include:\n- Core 20: \u003chttps://snapcraft.io/core20\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core18**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core18\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core18","snap-id":"CSO04Jhav2yK0uz97cr0ipQRyqg0qQL6","revision":"2976","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/core18/issues"],"source":["https://github.com/snapcore/core18"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/core18/issues","title":"Core 18 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core18 base snap provides a runtime environment based on Ubuntu 18.04 LTS (Bionic Beaver).\n\nOther Ubuntu environment base snaps include:\n- Core 20: \u003chttps://snapcraft.io/core20\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core18**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core18\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2976","channel":"latest/stable","last-refresh-time":"2025-11-20T19:59:15.919797125-06:00"},"core20":{"type":"base","sequence":[{"name":"core20","snap-id":"DLqre5XGLbDqg9jPtiAhRRjDuPVa5X1q","revision":"2669","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core20"],"website":["https://snapcraft.io"]},"title":"Core 20 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core20 base snap provides a runtime environment based on Ubuntu 20.04 LTS (Focal Fossa).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core20**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core20\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core20","snap-id":"DLqre5XGLbDqg9jPtiAhRRjDuPVa5X1q","revision":"2682","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core20"],"website":["https://snapcraft.io"]},"title":"Core 20 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core20 base snap provides a runtime environment based on Ubuntu 20.04 LTS (Focal Fossa).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core20**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core20\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2682","channel":"latest/stable","last-refresh-time":"2025-11-07T04:04:17.224850296-06:00"},"core22":{"type":"base","sequence":[{"name":"core22","snap-id":"amcUKQILKXHHTlmSa7NMdnXSx02dNeeT","revision":"2139","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core22"],"website":["https://snapcraft.io/"]},"title":"Core 22 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core22 base snap provides a runtime environment based on Ubuntu 22.04 LTS (Jammy Jellyfish).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 20: \u003chttps://snapcraft.io/core20\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core22**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core22\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core22","snap-id":"amcUKQILKXHHTlmSa7NMdnXSx02dNeeT","revision":"2163","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core22"],"website":["https://snapcraft.io/"]},"title":"Core 22 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core22 base snap provides a runtime environment based on Ubuntu 22.04 LTS (Jammy Jellyfish).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 20: \u003chttps://snapcraft.io/core20\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core22**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core22\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2163","channel":"latest/stable","last-refresh-time":"2025-11-19T13:09:16.384814635-06:00"},"lxd":{"type":"app","sequence":[{"name":"lxd","snap-id":"J60k4JY0HppjwOjW8dZdYc8obXKxujRu","revision":"32662","channel":"4.0/stable","links":{"contact":["mailto:lxd@lists.canonical.com"],"issues":["https://github.com/canonical/lxd/issues"],"source":["https://github.com/canonical/lxd"],"website":["https://ubuntu.com/lxd"]},"contact":"mailto:lxd@lists.canonical.com","title":"LXD","summary":"LXD - container and VM manager","description":"LXD is a system container and virtual machine manager.\n\nIt offers a simple CLI and REST API to manage local or remote instances,\nuses an image based workflow and support for a variety of advanced features.\n\nImages are available for all Ubuntu releases and architectures as well\nas for a wide number of other Linux distributions. Existing\nintegrations with many deployment and operation tools, makes it work\njust like a public cloud, except everything is under your control.\n\nLXD containers are lightweight, secure by default and a great\nalternative to virtual machines when running Linux on Linux.\n\nLXD virtual machines are modern and secure, using UEFI and secure-boot\nby default and a great choice when a different kernel or operating\nsystem is needed.\n\nWith clustering, up to 50 LXD servers can be easily joined and managed\ntogether with the same tools and APIs and without needing any external\ndependencies.\n\n\nSupported configuration options for the snap (snap set lxd [\u003ckey\u003e=\u003cvalue\u003e...]):\n\n - apparmor.unprivileged-restrictions-disable: Whether to disable restrictions on unprivileged user namespaces [default=true]\n - ceph.builtin: Use snap-specific Ceph configuration [default=false]\n - ceph.external: Use the system's ceph tools (ignores ceph.builtin) [default=false]\n - criu.enable: Enable experimental live-migration support [default=false]\n - daemon.debug: Increase logging to debug level [default=false]\n - daemon.group: Set group of users that have full control over LXD [default=lxd]\n - daemon.user.group: Set group of users that have restricted LXD access [default=lxd]\n - daemon.preseed: Pass a YAML configuration to `lxd init` on initial start\n - daemon.syslog: Send LXD log events to syslog [default=false]\n - daemon.verbose: Increase logging to verbose level [default=false]\n - lvm.external: Use the system's LVM tools [default=false]\n - lxcfs.pidfd: Start per-container process tracking [default=false]\n - lxcfs.loadavg: Start tracking per-container load average [default=false]\n - lxcfs.cfs: Consider CPU shares for CPU usage [default=false]\n - lxcfs.debug: Increase logging to debug level [default=false]\n - minio.path: Path to the directory containing the minio and mc binaries to use with LXD [default=\"\"]\n - openvswitch.builtin: Run a snap-specific OVS daemon [default=false]\n - openvswitch.external: Use the system's OVS tools (ignores openvswitch.builtin) [default=false]\n - ovn.builtin: Use snap-specific OVN configuration [default=false]\n - ui.enable: Enable the web interface [default=true]\n - zfs.external: Use the system's ZFS tools [default=false]\n\nFor system-wide configuration of the CLI, place your configuration in\n/var/snap/lxd/common/global-conf/ (config.yml and servercerts)"},{"name":"lxd","snap-id":"J60k4JY0HppjwOjW8dZdYc8obXKxujRu","revision":"36554","channel":"4.0/stable","links":{"contact":["mailto:lxd@lists.canonical.com"],"issues":["https://github.com/canonical/lxd/issues"],"source":["https://github.com/canonical/lxd"],"website":["https://ubuntu.com/lxd"]},"contact":"mailto:lxd@lists.canonical.com","title":"LXD","summary":"LXD - container and VM manager","description":"LXD is a system container and virtual machine manager.\n\nIt offers a simple CLI and REST API to manage local or remote instances,\nuses an image based workflow and support for a variety of advanced features.\n\nImages are available for all Ubuntu releases and architectures as well\nas for a wide number of other Linux distributions. Existing\nintegrations with many deployment and operation tools, makes it work\njust like a public cloud, except everything is under your control.\n\nLXD containers are lightweight, secure by default and a great\nalternative to virtual machines when running Linux on Linux.\n\nLXD virtual machines are modern and secure, using UEFI and secure-boot\nby default and a great choice when a different kernel or operating\nsystem is needed.\n\nWith clustering, up to 50 LXD servers can be easily joined and managed\ntogether with the same tools and APIs and without needing any external\ndependencies.\n\n\nSupported configuration options for the snap (snap set lxd [\u003ckey\u003e=\u003cvalue\u003e...]):\n\n - apparmor.unprivileged-restrictions-disable: Whether to disable restrictions on unprivileged user namespaces [default=true]\n - ceph.builtin: Use snap-specific Ceph configuration [default=false]\n - ceph.external: Use the system's ceph tools (ignores ceph.builtin) [default=false]\n - criu.enable: Enable experimental live-migration support [default=false]\n - daemon.debug: Increase logging to debug level [default=false]\n - daemon.group: Set group of users that have full control over LXD [default=lxd]\n - daemon.user.group: Set group of users that have restricted LXD access [default=lxd]\n - daemon.preseed: Pass a YAML configuration to `lxd init` on initial start\n - daemon.syslog: Send LXD log events to syslog [default=false]\n - daemon.verbose: Increase logging to verbose level [default=false]\n - db.trace: Enable dqlite trace logging (very verbose) [default=false]\n - lvm.external: Use the system's LVM tools [default=false]\n - lxcfs.pidfd: Start per-container process tracking [default=false]\n - lxcfs.loadavg: Start tracking per-container load average [default=false]\n - lxcfs.cfs: Consider CPU shares for CPU usage [default=false]\n - lxcfs.debug: Increase logging to debug level [default=false]\n - minio.path: Path to the directory containing the minio and mc binaries to use with LXD [default=\"\"]\n - openvswitch.builtin: Run a snap-specific OVS daemon [default=false]\n - openvswitch.external: Use the system's OVS tools (ignores openvswitch.builtin) [default=false]\n - ovn.builtin: Use snap-specific OVN configuration [default=false]\n - ui.enable: Enable the web interface [default=true]\n - zfs.external: Use the system's ZFS tools [default=false]\n\nFor system-wide configuration of the CLI, place your configuration in\n/var/snap/lxd/common/global-conf/ (config.yml and servercerts)"}],"active":true,"current":"36554","channel":"4.0/stable/ubuntu-20.04","aliases":{"lxc":{"auto":"lxc"}},"last-refresh-time":"2025-11-26T10:49:18.039712567-06:00","base":"core20"},"snapd":{"type":"snapd","sequence":[{"name":"snapd","snap-id":"PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4","revision":"25202","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/snapd/issues"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/snapd/issues","title":"snapd","summary":"Daemon and tooling that enable snap packages","description":"Install, configure, refresh and remove snap packages. Snaps are\n'universal' packages that work across many different Linux systems,\nenabling secure distribution of the latest apps and utilities for\ncloud, servers, desktops and the internet of things.\n\nStart with 'snap list' to see installed snaps."},{"name":"snapd","snap-id":"PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4","revision":"25577","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/snapd/issues"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/snapd/issues","title":"snapd","summary":"Daemon and tooling that enable snap packages","description":"Install, configure, refresh and remove snap packages. Snaps are\n'universal' packages that work across many different Linux systems,\nenabling secure distribution of the latest apps and utilities for\ncloud, servers, desktops and the internet of things.\n\nStart with 'snap list' to see installed snaps."}],"active":true,"current":"25577","channel":"latest/stable","required":true,"last-refresh-time":"2025-10-21T15:44:06.612351873-06:00"}},"start-of-operation-time":"2021-04-23T00:34:45.630907428Z","timings":[{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":693350072}],"start-time":"2025-11-24T14:09:12.594656412-06:00","stop-time":"2025-11-24T14:09:13.288006525-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":304239980},{"label":"write-catalogs","summary":"query store for catalogs","duration":739434867}],"start-time":"2025-11-24T17:29:12.594981935-06:00","stop-time":"2025-11-24T17:29:13.649222965-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":693767651}],"start-time":"2025-11-24T19:24:12.594586017-06:00","stop-time":"2025-11-24T19:24:13.288353673-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":845949375}],"start-time":"2025-11-25T04:29:12.594845989-06:00","stop-time":"2025-11-25T04:29:13.440795364-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":815386263}],"start-time":"2025-11-25T08:04:12.594757254-06:00","stop-time":"2025-11-25T08:04:13.410143533-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":641680669}],"start-time":"2025-11-25T13:49:12.595754991-06:00","stop-time":"2025-11-25T13:49:13.237435656-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":281294502},{"label":"write-catalogs","summary":"query store for catalogs","duration":782326870}],"start-time":"2025-11-25T17:29:12.595078034-06:00","stop-time":"2025-11-25T17:29:13.669343018-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":676782787}],"start-time":"2025-11-25T21:34:12.594560519-06:00","stop-time":"2025-11-25T21:34:13.271343296-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":712895406}],"start-time":"2025-11-26T03:29:12.594659739-06:00","stop-time":"2025-11-26T03:29:13.307555141-06:00"},{"tags":{"change-id":"172","ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":749562527}],"start-time":"2025-11-26T10:49:12.594780862-06:00","stop-time":"2025-11-26T10:49:13.344343379-06:00"},{"tags":{"change-id":"172","task-id":"3720","task-kind":"prerequisites","task-status":"Doing"},"start-time":"2025-11-26T10:49:13.369598677-06:00","stop-time":"2025-11-26T10:49:13.370092096-06:00"},{"tags":{"change-id":"172","task-id":"3721","task-kind":"download-snap","task-status":"Doing"},"timings":[{"label":"download","summary":"download snap \"lxd\"","duration":1676700158}],"start-time":"2025-11-26T10:49:13.39656931-06:00","stop-time":"2025-11-26T10:49:15.073269562-06:00"},{"tags":{"change-id":"172","task-id":"3723","task-kind":"mount-snap","task-status":"Doing"},"timings":[{"label":"check-snap","summary":"check snap \"lxd\"","duration":30056327},{"label":"setup-snap","summary":"setup snap \"lxd\"","duration":281608660}],"start-time":"2025-11-26T10:49:15.950633745-06:00","stop-time":"2025-11-26T10:49:16.262301996-06:00"},{"tags":{"change-id":"172","task-id":"3725","task-kind":"stop-snap-services","task-status":"Doing"},"timings":[{"label":"stop-services","summary":"stop services","duration":34949973},{"level":1,"label":"stop-service","summary":"stop service \"snap.lxd.daemon.unix.socket\"","duration":13787646},{"level":1,"label":"stop-service","summary":"stop service \"snap.lxd.daemon.service\"","duration":12143435},{"level":1,"label":"stop-service","summary":"stop service \"snap.lxd.activate.service\"","duration":9000803}],"start-time":"2025-11-26T10:49:16.320067337-06:00","stop-time":"2025-11-26T10:49:16.35501742-06:00"},{"tags":{"change-id":"172","task-id":"3729","task-kind":"setup-profiles","task-status":"Doing"},"timings":[{"label":"setup-security-backend","summary":"setup security backend \"mount\" for snap \"lxd\"","duration":7436312},{"label":"setup-security-backend[many]","summary":"setup security backend \"apparmor\" for 2 snaps","duration":880867756},{"level":1,"label":"load-profiles[changed-many]","summary":"load changed security profiles of 2 snaps","duration":808876022}],"start-time":"2025-11-26T10:49:16.874851352-06:00","stop-time":"2025-11-26T10:49:17.768751456-06:00"},{"tags":{"change-id":"172","task-id":"3730","task-kind":"link-snap","task-status":"Doing"},"timings":[{"label":"generate-wrappers","summary":"generate wrappers for snap lxd","duration":244244786}],"start-time":"2025-11-26T10:49:17.790639885-06:00","stop-time":"2025-11-26T10:49:18.034884814-06:00"},{"tags":{"change-id":"172","task-id":"3735","task-kind":"start-snap-services","task-status":"Doing"},"timings":[{"label":"enable-services","summary":"enable services [\"snap.lxd.daemon.unix.socket\" \"snap.lxd.activate.service\"]","duration":264227434},{"label":"start-services","summary":"start services","duration":614555622},{"level":1,"label":"start-service","summary":"start service \"snap.lxd.daemon.unix.socket\"","duration":6908318},{"level":1,"label":"start-service","summary":"start service \"snap.lxd.activate.service\"","duration":607628785}],"start-time":"2025-11-26T10:49:18.142828859-06:00","stop-time":"2025-11-26T10:49:19.021613304-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":636901367}],"start-time":"2025-11-26T16:54:12.594633282-06:00","stop-time":"2025-11-26T16:54:13.231534646-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":275598663},{"label":"write-catalogs","summary":"query store for catalogs","duration":739110578}],"start-time":"2025-11-26T17:29:12.59530793-06:00","stop-time":"2025-11-26T17:29:13.620640844-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":627293219}],"start-time":"2025-11-26T19:24:12.594753108-06:00","stop-time":"2025-11-26T19:24:13.222046444-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":718952829}],"start-time":"2025-11-27T02:44:12.594638339-06:00","stop-time":"2025-11-27T02:44:13.313591163-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":869104392}],"start-time":"2025-11-27T06:14:12.594614736-06:00","stop-time":"2025-11-27T06:14:13.463719131-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":677150280}],"start-time":"2025-11-27T14:04:12.59461683-06:00","stop-time":"2025-11-27T14:04:13.271767114-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":727240118}],"start-time":"2025-11-27T22:34:12.594532855-06:00","stop-time":"2025-11-27T22:34:13.321788414-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":647469381}],"start-time":"2025-11-28T00:39:12.594669782-06:00","stop-time":"2025-11-28T00:39:13.242139169-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1126449371}],"start-time":"2025-11-28T09:09:12.594771961-06:00","stop-time":"2025-11-28T09:09:13.721221343-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":630190076}],"start-time":"2025-11-28T16:14:12.61359536-06:00","stop-time":"2025-11-28T16:14:13.243785429-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":832356253}],"start-time":"2025-11-28T23:09:12.595804707-06:00","stop-time":"2025-11-28T23:09:13.428160943-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":652609595}],"start-time":"2025-11-29T00:59:12.594897477-06:00","stop-time":"2025-11-29T00:59:13.247507061-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":610785036}],"start-time":"2025-11-29T08:34:12.594777929-06:00","stop-time":"2025-11-29T08:34:13.205562957-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":650111528}],"start-time":"2025-11-29T17:04:12.594982937-06:00","stop-time":"2025-11-29T17:04:13.245094448-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":281091459},{"label":"write-catalogs","summary":"query store for catalogs","duration":775428718}],"start-time":"2025-11-29T17:39:12.610305185-06:00","stop-time":"2025-11-29T17:39:13.680716563-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":609580635}],"start-time":"2025-11-29T21:49:12.595747366-06:00","stop-time":"2025-11-29T21:49:13.205328-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":637870137}],"start-time":"2025-11-30T05:54:12.594759271-06:00","stop-time":"2025-11-30T05:54:13.232629409-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":618816763}],"start-time":"2025-11-30T08:14:12.594625142-06:00","stop-time":"2025-11-30T08:14:13.213441912-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":627959325}],"start-time":"2025-11-30T16:34:12.594577658-06:00","stop-time":"2025-11-30T16:34:13.222536994-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":286483875},{"label":"write-catalogs","summary":"query store for catalogs","duration":834040093}],"start-time":"2025-11-30T17:44:12.594777751-06:00","stop-time":"2025-11-30T17:44:13.725443193-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":631091550}],"start-time":"2025-11-30T21:29:12.622330376-06:00","stop-time":"2025-11-30T21:29:13.253421919-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":780174699}],"start-time":"2025-12-01T01:14:12.594684111-06:00","stop-time":"2025-12-01T01:14:13.374858817-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":686082452}],"start-time":"2025-12-01T11:49:12.595787961-06:00","stop-time":"2025-12-01T11:49:13.281870403-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":655602797}],"start-time":"2025-12-01T16:54:12.594979583-06:00","stop-time":"2025-12-01T16:54:13.250582386-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":280589221},{"label":"write-catalogs","summary":"query store for catalogs","duration":792245305}],"start-time":"2025-12-01T17:49:12.594769112-06:00","stop-time":"2025-12-01T17:49:13.67865836-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":718457381}],"start-time":"2025-12-01T19:39:12.594697731-06:00","stop-time":"2025-12-01T19:39:13.313155119-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":715689021}],"start-time":"2025-12-02T01:09:12.59469619-06:00","stop-time":"2025-12-02T01:09:13.310385248-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":757122621}],"start-time":"2025-12-02T07:09:12.594765168-06:00","stop-time":"2025-12-02T07:09:13.351887774-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":674907858}],"start-time":"2025-12-02T14:09:12.594638423-06:00","stop-time":"2025-12-02T14:09:13.269546282-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":308499994},{"label":"write-catalogs","summary":"query store for catalogs","duration":938252074}],"start-time":"2025-12-02T17:49:12.595986787-06:00","stop-time":"2025-12-02T17:49:13.852614725-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":647013408}],"start-time":"2025-12-02T21:39:12.594673243-06:00","stop-time":"2025-12-02T21:39:13.241686648-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":707739222}],"start-time":"2025-12-03T05:44:12.594623214-06:00","stop-time":"2025-12-03T05:44:13.302362403-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":960994318}],"start-time":"2025-12-03T07:39:12.595115745-06:00","stop-time":"2025-12-03T07:39:13.556110073-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1103020174}],"start-time":"2025-12-03T16:24:12.59468328-06:00","stop-time":"2025-12-03T16:24:13.697703448-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":699110740}],"start-time":"2025-12-03T18:34:12.594617164-06:00","stop-time":"2025-12-03T18:34:13.293727899-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":740517395}],"start-time":"2025-12-04T04:19:12.625056513-06:00","stop-time":"2025-12-04T04:19:13.365573901-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":795348231}],"start-time":"2025-12-04T06:14:12.594600231-06:00","stop-time":"2025-12-04T06:14:13.389948467-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":871852121}],"start-time":"2025-12-04T14:34:12.594603199-06:00","stop-time":"2025-12-04T14:34:13.466455318-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":619767578}],"start-time":"2025-12-04T19:34:12.594759086-06:00","stop-time":"2025-12-04T19:34:13.214526671-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":724442342}],"start-time":"2025-12-05T02:59:12.595003949-06:00","stop-time":"2025-12-05T02:59:13.319446334-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":615776001}],"start-time":"2025-12-05T07:24:12.594589362-06:00","stop-time":"2025-12-05T07:24:13.210365367-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":729553944}],"start-time":"2025-12-05T12:19:12.595070479-06:00","stop-time":"2025-12-05T12:19:13.324624421-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":665984924}],"start-time":"2025-12-05T18:44:12.601035369-06:00","stop-time":"2025-12-05T18:44:13.267020349-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":643067357}],"start-time":"2025-12-06T04:04:12.614736473-06:00","stop-time":"2025-12-06T04:04:13.257803827-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":666756727}],"start-time":"2025-12-06T09:19:12.595739839-06:00","stop-time":"2025-12-06T09:19:13.262496552-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":622362032}],"start-time":"2025-12-06T15:14:12.594581881-06:00","stop-time":"2025-12-06T15:14:13.2169439-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":298618893},{"label":"write-catalogs","summary":"query store for catalogs","duration":856355948}],"start-time":"2025-12-06T18:09:12.594791036-06:00","stop-time":"2025-12-06T18:09:13.761716926-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":646740854}],"start-time":"2025-12-06T20:44:12.59469046-06:00","stop-time":"2025-12-06T20:44:13.241431315-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":691916413}],"start-time":"2025-12-07T03:44:12.594553761-06:00","stop-time":"2025-12-07T03:44:13.28647018-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":686228404}],"start-time":"2025-12-07T08:24:12.594565778-06:00","stop-time":"2025-12-07T08:24:13.280794188-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":630631339}],"start-time":"2025-12-07T15:14:12.594631887-06:00","stop-time":"2025-12-07T15:14:13.225263223-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":753860509}],"start-time":"2025-12-07T23:39:12.69525148-06:00","stop-time":"2025-12-07T23:39:13.449111981-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":716608663}],"start-time":"2025-12-08T01:49:12.595029152-06:00","stop-time":"2025-12-08T01:49:13.311637816-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":714328348}],"start-time":"2025-12-08T07:09:12.594785512-06:00","stop-time":"2025-12-08T07:09:13.309113865-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":697340691}],"start-time":"2025-12-08T14:14:12.594567771-06:00","stop-time":"2025-12-08T14:14:13.291908449-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1112251718}],"start-time":"2025-12-08T23:49:12.59457803-06:00","stop-time":"2025-12-08T23:49:13.70682975-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":726163438}],"start-time":"2025-12-09T05:14:12.594601444-06:00","stop-time":"2025-12-09T05:14:13.320764829-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":766977694}],"start-time":"2025-12-09T08:09:12.602817617-06:00","stop-time":"2025-12-09T08:09:13.369795305-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":667724451}],"start-time":"2025-12-09T15:54:12.594605773-06:00","stop-time":"2025-12-09T15:54:13.262330227-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":303462137},{"label":"write-catalogs","summary":"query store for catalogs","duration":920906275}],"start-time":"2025-12-09T18:14:12.594781788-06:00","stop-time":"2025-12-09T18:14:13.830742947-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":620062865}],"start-time":"2025-12-09T21:39:12.594649475-06:00","stop-time":"2025-12-09T21:39:13.214712342-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":726945484}],"start-time":"2025-12-10T02:59:12.594731892-06:00","stop-time":"2025-12-10T02:59:13.32167737-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":696707633}],"start-time":"2025-12-10T07:14:12.594622764-06:00","stop-time":"2025-12-10T07:14:13.291330392-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":690132980}],"start-time":"2025-12-10T15:59:12.614454533-06:00","stop-time":"2025-12-10T15:59:13.304587499-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":288807941},{"label":"write-catalogs","summary":"query store for catalogs","duration":767361740}],"start-time":"2025-12-10T18:19:12.594847878-06:00","stop-time":"2025-12-10T18:19:13.662354415-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":655797754}],"start-time":"2025-12-10T21:19:12.61418475-06:00","stop-time":"2025-12-10T21:19:13.269982493-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":918468036}],"start-time":"2025-12-11T01:54:12.594595747-06:00","stop-time":"2025-12-11T01:54:13.513063781-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":757056182}],"start-time":"2025-12-11T10:09:12.595975531-06:00","stop-time":"2025-12-11T10:09:13.353031745-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":736366524}],"start-time":"2025-12-11T12:54:12.594639097-06:00","stop-time":"2025-12-11T12:54:13.331005619-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":719275597}],"start-time":"2025-12-11T22:19:12.594917309-06:00","stop-time":"2025-12-11T22:19:13.314192985-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":659467559}],"start-time":"2025-12-12T01:59:12.59468793-06:00","stop-time":"2025-12-12T01:59:13.254155485-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":806564423}],"start-time":"2025-12-12T09:44:12.594623667-06:00","stop-time":"2025-12-12T09:44:13.401188093-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":668532165}],"start-time":"2025-12-12T13:44:12.594651153-06:00","stop-time":"2025-12-12T13:44:13.263183318-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":290788419},{"label":"write-catalogs","summary":"query store for catalogs","duration":824887073}],"start-time":"2025-12-12T18:24:12.59525537-06:00","stop-time":"2025-12-12T18:24:13.720667092-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":714323978}],"start-time":"2025-12-12T19:49:12.594639794-06:00","stop-time":"2025-12-12T19:49:13.308963765-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":675056160}],"start-time":"2025-12-13T01:44:12.594635921-06:00","stop-time":"2025-12-13T01:44:13.269692072-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":681895294}],"start-time":"2025-12-13T07:09:12.594744809-06:00","stop-time":"2025-12-13T07:09:13.276640095-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":636519634}],"start-time":"2025-12-13T15:34:12.59474039-06:00","stop-time":"2025-12-13T15:34:13.231260064-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":282351710},{"label":"write-catalogs","summary":"query store for catalogs","duration":804983705}],"start-time":"2025-12-13T18:29:12.595726748-06:00","stop-time":"2025-12-13T18:29:13.694006142-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":625003700}],"start-time":"2025-12-13T21:44:12.594648118-06:00","stop-time":"2025-12-13T21:44:13.219651808-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1064672770}],"start-time":"2025-12-14T03:54:12.614771165-06:00","stop-time":"2025-12-14T03:54:13.679443923-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":705086796}],"start-time":"2025-12-14T08:39:12.594579676-06:00","stop-time":"2025-12-14T08:39:13.299666427-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":627771949}],"start-time":"2025-12-14T12:29:12.59621759-06:00","stop-time":"2025-12-14T12:29:13.223989528-06:00"}]},"changes":{},"tasks":{},"last-change-id":172,"last-task-id":3741,"last-lane-id":175,"last-notice-id":58,"last-notice-timestamp":"2025-11-26T16:49:20.593229991Z"}