@@ -1044,14 +1044,14 @@ EncryptCipherDomainId getEncryptDetailsFromMutationRef(ProxyCommitData* commitDa
1044
1044
// 2. Transaction can be a multi-key transaction spawning multiple tenants
1045
1045
// For now fallback to 'default encryption domain'
1046
1046
1047
- CODE_PROBE(true, "ClearRange mutation encryption");
1047
+ CODE_PROBE(true, "ClearRange mutation encryption", probe::decoration::rare );
1048
1048
}
1049
1049
1050
1050
// Unknown tenant, fallback to fdb default encryption domain
1051
1051
if (domainId == INVALID_ENCRYPT_DOMAIN_ID) {
1052
1052
domainId = FDB_DEFAULT_ENCRYPT_DOMAIN_ID;
1053
1053
1054
- CODE_PROBE(true, "Default domain mutation encryption");
1054
+ CODE_PROBE(true, "Default domain mutation encryption", probe::decoration::rare );
1055
1055
}
1056
1056
1057
1057
return domainId;
@@ -1817,7 +1817,7 @@ ACTOR Future<WriteMutationRefVar> writeMutationEncryptedMutation(CommitBatchCont
1817
1817
ASSERT(decryptedMutation.param1 == mutation->param1);
1818
1818
ASSERT(decryptedMutation.param2 == mutation->param2);
1819
1819
1820
- CODE_PROBE(true, "encrypting non-metadata mutations");
1820
+ CODE_PROBE(true, "encrypting non-metadata mutations", probe::decoration::rare );
1821
1821
self->toCommit.writeTypedMessage(encryptedMutation);
1822
1822
return encryptedMutation;
1823
1823
}
@@ -1852,7 +1852,7 @@ Future<WriteMutationRefVar> writeMutation(CommitBatchContext* self,
1852
1852
CODE_PROBE(self->pProxyCommitData->getTenantMode() == TenantMode::REQUIRED, "using required tenant mode");
1853
1853
1854
1854
if (encryptedMutationOpt && encryptedMutationOpt->present()) {
1855
- CODE_PROBE(true, "using already encrypted mutation");
1855
+ CODE_PROBE(true, "using already encrypted mutation", probe::decoration::rare );
1856
1856
encryptedMutation = encryptedMutationOpt->get();
1857
1857
ASSERT(encryptedMutation.isEncrypted());
1858
1858
// During simulation check whether the encrypted mutation matches the decrpyted mutation
@@ -1862,15 +1862,15 @@ Future<WriteMutationRefVar> writeMutation(CommitBatchContext* self,
1862
1862
} else {
1863
1863
if (domainId == INVALID_ENCRYPT_DOMAIN_ID) {
1864
1864
domainId = getEncryptDetailsFromMutationRef(self->pProxyCommitData, *mutation);
1865
- CODE_PROBE(true, "Raw access mutation encryption");
1865
+ CODE_PROBE(true, "Raw access mutation encryption", probe::decoration::rare );
1866
1866
}
1867
1867
ASSERT_NE(domainId, INVALID_ENCRYPT_DOMAIN_ID);
1868
1868
ASSERT(self->cipherKeys.count(domainId) > 0);
1869
1869
encryptedMutation =
1870
1870
mutation->encrypt(self->cipherKeys, domainId, *arena, BlobCipherMetrics::TLOG, encryptTime);
1871
1871
}
1872
1872
ASSERT(encryptedMutation.isEncrypted());
1873
- CODE_PROBE(true, "encrypting non-metadata mutations");
1873
+ CODE_PROBE(true, "encrypting non-metadata mutations", probe::decoration::rare );
1874
1874
self->toCommit.writeTypedMessage(encryptedMutation);
1875
1875
return std::variant<MutationRef, VectorRef<MutationRef>>{ encryptedMutation };
1876
1876
} else {
@@ -1918,7 +1918,7 @@ double pushToBackupMutations(CommitBatchContext* self,
1918
1918
// Add the mutation to the relevant backup tag
1919
1919
for (auto backupName : pProxyCommitData->vecBackupKeys[m.param1]) {
1920
1920
// If encryption is enabled make sure the mutation we are writing is also encrypted
1921
- CODE_PROBE(writtenMutation.isEncrypted(), "using encrypted backup mutation");
1921
+ CODE_PROBE(writtenMutation.isEncrypted(), "using encrypted backup mutation", probe::decoration::rare );
1922
1922
self->logRangeMutations[backupName].push_back_deep(self->logRangeMutationsArena, writtenMutation);
1923
1923
}
1924
1924
@@ -1938,7 +1938,7 @@ double pushToBackupMutations(CommitBatchContext* self,
1938
1938
MutationRef backupMutation(MutationRef::Type::ClearRange, intersectionRange.begin, intersectionRange.end);
1939
1939
1940
1940
if (pProxyCommitData->encryptMode.isEncryptionEnabled()) {
1941
- CODE_PROBE(true, "encrypting clear range backup mutation");
1941
+ CODE_PROBE(true, "encrypting clear range backup mutation", probe::decoration::rare );
1942
1942
if (backupMutation.param1 == m.param1 && backupMutation.param2 == m.param2 &&
1943
1943
encryptedMutation.present()) {
1944
1944
backupMutation = encryptedMutation.get();
@@ -2318,7 +2318,7 @@ ACTOR Future<Void> postResolution(CommitBatchContext* self) {
2318
2318
auto& tags = pProxyCommitData->tagsForKey(kv.key);
2319
2319
self->toCommit.addTags(tags);
2320
2320
if (self->pProxyCommitData->encryptMode.isEncryptionEnabled()) {
2321
- CODE_PROBE(true, "encrypting idempotency mutation");
2321
+ CODE_PROBE(true, "encrypting idempotency mutation", probe::decoration::rare );
2322
2322
EncryptCipherDomainId domainId =
2323
2323
getEncryptDetailsFromMutationRef(self->pProxyCommitData, idempotencyIdSet);
2324
2324
MutationRef encryptedMutation =
0 commit comments