@@ -1044,14 +1044,14 @@ EncryptCipherDomainId getEncryptDetailsFromMutationRef(ProxyCommitData* commitDa
10441044		//  2. Transaction can be a multi-key transaction spawning multiple tenants
10451045		//  For now fallback to 'default encryption domain'
10461046
1047- 		CODE_PROBE (true , " ClearRange mutation encryption"  );
1047+ 		CODE_PROBE (true , " ClearRange mutation encryption" , probe::decoration::rare );
10481048	}
10491049
10501050	//  Unknown tenant, fallback to fdb default encryption domain
10511051	if  (domainId == INVALID_ENCRYPT_DOMAIN_ID) {
10521052		domainId = FDB_DEFAULT_ENCRYPT_DOMAIN_ID;
10531053
1054- 		CODE_PROBE (true , " Default domain mutation encryption"  );
1054+ 		CODE_PROBE (true , " Default domain mutation encryption" , probe::decoration::rare );
10551055	}
10561056
10571057	return  domainId;
@@ -1817,7 +1817,7 @@ ACTOR Future<WriteMutationRefVar> writeMutationEncryptedMutation(CommitBatchCont
18171817	ASSERT (decryptedMutation.param1  == mutation->param1 );
18181818	ASSERT (decryptedMutation.param2  == mutation->param2 );
18191819
1820- 	CODE_PROBE (true , " encrypting non-metadata mutations"  );
1820+ 	CODE_PROBE (true , " encrypting non-metadata mutations" , probe::decoration::rare );
18211821	self->toCommit .writeTypedMessage (encryptedMutation);
18221822	return  encryptedMutation;
18231823}
@@ -1852,7 +1852,7 @@ Future<WriteMutationRefVar> writeMutation(CommitBatchContext* self,
18521852		CODE_PROBE (self->pProxyCommitData ->getTenantMode () == TenantMode::REQUIRED, " using required tenant mode"  );
18531853
18541854		if  (encryptedMutationOpt && encryptedMutationOpt->present ()) {
1855- 			CODE_PROBE (true , " using already encrypted mutation"  );
1855+ 			CODE_PROBE (true , " using already encrypted mutation" , probe::decoration::rare );
18561856			encryptedMutation = encryptedMutationOpt->get ();
18571857			ASSERT (encryptedMutation.isEncrypted ());
18581858			//  During simulation check whether the encrypted mutation matches the decrpyted mutation
@@ -1862,15 +1862,15 @@ Future<WriteMutationRefVar> writeMutation(CommitBatchContext* self,
18621862		} else  {
18631863			if  (domainId == INVALID_ENCRYPT_DOMAIN_ID) {
18641864				domainId = getEncryptDetailsFromMutationRef (self->pProxyCommitData , *mutation);
1865- 				CODE_PROBE (true , " Raw access mutation encryption"  );
1865+ 				CODE_PROBE (true , " Raw access mutation encryption" , probe::decoration::rare );
18661866			}
18671867			ASSERT_NE (domainId, INVALID_ENCRYPT_DOMAIN_ID);
18681868			ASSERT (self->cipherKeys .count (domainId) > 0 );
18691869			encryptedMutation =
18701870			    mutation->encrypt (self->cipherKeys , domainId, *arena, BlobCipherMetrics::TLOG, encryptTime);
18711871		}
18721872		ASSERT (encryptedMutation.isEncrypted ());
1873- 		CODE_PROBE (true , " encrypting non-metadata mutations"  );
1873+ 		CODE_PROBE (true , " encrypting non-metadata mutations" , probe::decoration::rare );
18741874		self->toCommit .writeTypedMessage (encryptedMutation);
18751875		return  std::variant<MutationRef, VectorRef<MutationRef>>{ encryptedMutation };
18761876	} else  {
@@ -1918,7 +1918,7 @@ double pushToBackupMutations(CommitBatchContext* self,
19181918		//  Add the mutation to the relevant backup tag
19191919		for  (auto  backupName : pProxyCommitData->vecBackupKeys [m.param1 ]) {
19201920			//  If encryption is enabled make sure the mutation we are writing is also encrypted
1921- 			CODE_PROBE (writtenMutation.isEncrypted (), " using encrypted backup mutation"  );
1921+ 			CODE_PROBE (writtenMutation.isEncrypted (), " using encrypted backup mutation" , probe::decoration::rare );
19221922			self->logRangeMutations [backupName].push_back_deep (self->logRangeMutationsArena , writtenMutation);
19231923		}
19241924
@@ -1938,7 +1938,7 @@ double pushToBackupMutations(CommitBatchContext* self,
19381938			MutationRef backupMutation (MutationRef::Type::ClearRange, intersectionRange.begin , intersectionRange.end );
19391939
19401940			if  (pProxyCommitData->encryptMode .isEncryptionEnabled ()) {
1941- 				CODE_PROBE (true , " encrypting clear range backup mutation"  );
1941+ 				CODE_PROBE (true , " encrypting clear range backup mutation" , probe::decoration::rare );
19421942				if  (backupMutation.param1  == m.param1  && backupMutation.param2  == m.param2  &&
19431943				    encryptedMutation.present ()) {
19441944					backupMutation = encryptedMutation.get ();
@@ -2318,7 +2318,7 @@ ACTOR Future<Void> postResolution(CommitBatchContext* self) {
23182318		    auto & tags = pProxyCommitData->tagsForKey (kv.key );
23192319		    self->toCommit .addTags (tags);
23202320		    if  (self->pProxyCommitData ->encryptMode .isEncryptionEnabled ()) {
2321- 			    CODE_PROBE (true , " encrypting idempotency mutation"  );
2321+ 			    CODE_PROBE (true , " encrypting idempotency mutation" , probe::decoration::rare );
23222322			    EncryptCipherDomainId domainId =
23232323			        getEncryptDetailsFromMutationRef (self->pProxyCommitData , idempotencyIdSet);
23242324			    MutationRef encryptedMutation =
0 commit comments