Jan 22 22:04:30 localhost kernel: Linux version 5.14.0-661.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-69.el9) #1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026 Jan 22 22:04:30 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Jan 22 22:04:30 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 root=UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Jan 22 22:04:30 localhost kernel: BIOS-provided physical RAM map: Jan 22 22:04:30 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 22 22:04:30 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 22 22:04:30 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 22 22:04:30 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Jan 22 22:04:30 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Jan 22 22:04:30 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 22 22:04:30 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 22 22:04:30 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Jan 22 22:04:30 localhost kernel: NX (Execute Disable) protection: active Jan 22 22:04:30 localhost kernel: APIC: Static calls initialized Jan 22 22:04:30 localhost kernel: SMBIOS 2.8 present. Jan 22 22:04:30 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Jan 22 22:04:30 localhost kernel: Hypervisor detected: KVM Jan 22 22:04:30 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 22 22:04:30 localhost kernel: kvm-clock: using sched offset of 3132185277 cycles Jan 22 22:04:30 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 22 22:04:30 localhost kernel: tsc: Detected 2799.998 MHz processor Jan 22 22:04:30 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 22 22:04:30 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 22 22:04:30 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Jan 22 22:04:30 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Jan 22 22:04:30 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 22 22:04:30 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Jan 22 22:04:30 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Jan 22 22:04:30 localhost kernel: Using GB pages for direct mapping Jan 22 22:04:30 localhost kernel: RAMDISK: [mem 0x2d426000-0x32a0afff] Jan 22 22:04:30 localhost kernel: ACPI: Early table checksum verification disabled Jan 22 22:04:30 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Jan 22 22:04:30 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 22:04:30 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 22:04:30 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 22:04:30 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Jan 22 22:04:30 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 22:04:30 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 22:04:30 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Jan 22 22:04:30 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Jan 22 22:04:30 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Jan 22 22:04:30 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Jan 22 22:04:30 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Jan 22 22:04:30 localhost kernel: No NUMA configuration found Jan 22 22:04:30 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Jan 22 22:04:30 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Jan 22 22:04:30 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Jan 22 22:04:30 localhost kernel: Zone ranges: Jan 22 22:04:30 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 22 22:04:30 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jan 22 22:04:30 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Jan 22 22:04:30 localhost kernel: Device empty Jan 22 22:04:30 localhost kernel: Movable zone start for each node Jan 22 22:04:30 localhost kernel: Early memory node ranges Jan 22 22:04:30 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 22 22:04:30 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Jan 22 22:04:30 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Jan 22 22:04:30 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Jan 22 22:04:30 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 22 22:04:30 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 22 22:04:30 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Jan 22 22:04:30 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Jan 22 22:04:30 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 22 22:04:30 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 22 22:04:30 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 22 22:04:30 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 22 22:04:30 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 22 22:04:30 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 22 22:04:30 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 22 22:04:30 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jan 22 22:04:30 localhost kernel: TSC deadline timer available Jan 22 22:04:30 localhost kernel: CPU topo: Max. logical packages: 8 Jan 22 22:04:30 localhost kernel: CPU topo: Max. logical dies: 8 Jan 22 22:04:30 localhost kernel: CPU topo: Max. dies per package: 1 Jan 22 22:04:30 localhost kernel: CPU topo: Max. threads per core: 1 Jan 22 22:04:30 localhost kernel: CPU topo: Num. cores per package: 1 Jan 22 22:04:30 localhost kernel: CPU topo: Num. threads per package: 1 Jan 22 22:04:30 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Jan 22 22:04:30 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Jan 22 22:04:30 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Jan 22 22:04:30 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Jan 22 22:04:30 localhost kernel: Booting paravirtualized kernel on KVM Jan 22 22:04:30 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 22 22:04:30 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Jan 22 22:04:30 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Jan 22 22:04:30 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Jan 22 22:04:30 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Jan 22 22:04:30 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Jan 22 22:04:30 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 root=UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Jan 22 22:04:30 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", will be passed to user space. Jan 22 22:04:30 localhost kernel: random: crng init done Jan 22 22:04:30 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jan 22 22:04:30 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jan 22 22:04:30 localhost kernel: Fallback order for Node 0: 0 Jan 22 22:04:30 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Jan 22 22:04:30 localhost kernel: Policy zone: Normal Jan 22 22:04:30 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 22 22:04:30 localhost kernel: software IO TLB: area num 8. Jan 22 22:04:30 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Jan 22 22:04:30 localhost kernel: ftrace: allocating 49417 entries in 194 pages Jan 22 22:04:30 localhost kernel: ftrace: allocated 194 pages with 3 groups Jan 22 22:04:30 localhost kernel: Dynamic Preempt: voluntary Jan 22 22:04:30 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Jan 22 22:04:30 localhost kernel: rcu: RCU event tracing is enabled. Jan 22 22:04:30 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Jan 22 22:04:30 localhost kernel: Trampoline variant of Tasks RCU enabled. Jan 22 22:04:30 localhost kernel: Rude variant of Tasks RCU enabled. Jan 22 22:04:30 localhost kernel: Tracing variant of Tasks RCU enabled. Jan 22 22:04:30 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 22 22:04:30 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Jan 22 22:04:30 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jan 22 22:04:30 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jan 22 22:04:30 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Jan 22 22:04:30 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Jan 22 22:04:30 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jan 22 22:04:30 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Jan 22 22:04:30 localhost kernel: Console: colour VGA+ 80x25 Jan 22 22:04:30 localhost kernel: printk: console [ttyS0] enabled Jan 22 22:04:30 localhost kernel: ACPI: Core revision 20230331 Jan 22 22:04:30 localhost kernel: APIC: Switch to symmetric I/O mode setup Jan 22 22:04:30 localhost kernel: x2apic enabled Jan 22 22:04:30 localhost kernel: APIC: Switched APIC routing to: physical x2apic Jan 22 22:04:30 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 22 22:04:30 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Jan 22 22:04:30 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 22 22:04:30 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 22 22:04:30 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 22 22:04:30 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 22 22:04:30 localhost kernel: Spectre V2 : Mitigation: Retpolines Jan 22 22:04:30 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jan 22 22:04:30 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jan 22 22:04:30 localhost kernel: RETBleed: Mitigation: untrained return thunk Jan 22 22:04:30 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jan 22 22:04:30 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jan 22 22:04:30 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Jan 22 22:04:30 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Jan 22 22:04:30 localhost kernel: x86/bugs: return thunk changed Jan 22 22:04:30 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Jan 22 22:04:30 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 22 22:04:30 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 22 22:04:30 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 22 22:04:30 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 22 22:04:30 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jan 22 22:04:30 localhost kernel: Freeing SMP alternatives memory: 40K Jan 22 22:04:30 localhost kernel: pid_max: default: 32768 minimum: 301 Jan 22 22:04:30 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Jan 22 22:04:30 localhost kernel: landlock: Up and running. Jan 22 22:04:30 localhost kernel: Yama: becoming mindful. Jan 22 22:04:30 localhost kernel: SELinux: Initializing. Jan 22 22:04:30 localhost kernel: LSM support for eBPF active Jan 22 22:04:30 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jan 22 22:04:30 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jan 22 22:04:30 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Jan 22 22:04:30 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jan 22 22:04:30 localhost kernel: ... version: 0 Jan 22 22:04:30 localhost kernel: ... bit width: 48 Jan 22 22:04:30 localhost kernel: ... generic registers: 6 Jan 22 22:04:30 localhost kernel: ... value mask: 0000ffffffffffff Jan 22 22:04:30 localhost kernel: ... max period: 00007fffffffffff Jan 22 22:04:30 localhost kernel: ... fixed-purpose events: 0 Jan 22 22:04:30 localhost kernel: ... event mask: 000000000000003f Jan 22 22:04:30 localhost kernel: signal: max sigframe size: 1776 Jan 22 22:04:30 localhost kernel: rcu: Hierarchical SRCU implementation. Jan 22 22:04:30 localhost kernel: rcu: Max phase no-delay instances is 400. Jan 22 22:04:30 localhost kernel: smp: Bringing up secondary CPUs ... Jan 22 22:04:30 localhost kernel: smpboot: x86: Booting SMP configuration: Jan 22 22:04:30 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Jan 22 22:04:30 localhost kernel: smp: Brought up 1 node, 8 CPUs Jan 22 22:04:30 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Jan 22 22:04:30 localhost kernel: node 0 deferred pages initialised in 11ms Jan 22 22:04:30 localhost kernel: Memory: 7763624K/8388068K available (16384K kernel code, 5797K rwdata, 13916K rodata, 4200K init, 7192K bss, 618356K reserved, 0K cma-reserved) Jan 22 22:04:30 localhost kernel: devtmpfs: initialized Jan 22 22:04:30 localhost kernel: x86/mm: Memory block size: 128MB Jan 22 22:04:30 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 22 22:04:30 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Jan 22 22:04:30 localhost kernel: pinctrl core: initialized pinctrl subsystem Jan 22 22:04:30 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jan 22 22:04:30 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Jan 22 22:04:30 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jan 22 22:04:30 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jan 22 22:04:30 localhost kernel: audit: initializing netlink subsys (disabled) Jan 22 22:04:30 localhost kernel: audit: type=2000 audit(1769137468.236:1): state=initialized audit_enabled=0 res=1 Jan 22 22:04:30 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Jan 22 22:04:30 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 22 22:04:30 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Jan 22 22:04:30 localhost kernel: cpuidle: using governor menu Jan 22 22:04:30 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 22 22:04:30 localhost kernel: PCI: Using configuration type 1 for base access Jan 22 22:04:30 localhost kernel: PCI: Using configuration type 1 for extended access Jan 22 22:04:30 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jan 22 22:04:30 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Jan 22 22:04:30 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Jan 22 22:04:30 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Jan 22 22:04:30 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Jan 22 22:04:30 localhost kernel: Demotion targets for Node 0: null Jan 22 22:04:30 localhost kernel: cryptd: max_cpu_qlen set to 1000 Jan 22 22:04:30 localhost kernel: ACPI: Added _OSI(Module Device) Jan 22 22:04:30 localhost kernel: ACPI: Added _OSI(Processor Device) Jan 22 22:04:30 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 22 22:04:30 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 22 22:04:30 localhost kernel: ACPI: Interpreter enabled Jan 22 22:04:30 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Jan 22 22:04:30 localhost kernel: ACPI: Using IOAPIC for interrupt routing Jan 22 22:04:30 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 22 22:04:30 localhost kernel: PCI: Using E820 reservations for host bridge windows Jan 22 22:04:30 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jan 22 22:04:30 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 22 22:04:30 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Jan 22 22:04:30 localhost kernel: acpiphp: Slot [3] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [4] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [5] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [6] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [7] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [8] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [9] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [10] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [11] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [12] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [13] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [14] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [15] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [16] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [17] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [18] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [19] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [20] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [21] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [22] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [23] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [24] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [25] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [26] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [27] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [28] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [29] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [30] registered Jan 22 22:04:30 localhost kernel: acpiphp: Slot [31] registered Jan 22 22:04:30 localhost kernel: PCI host bridge to bus 0000:00 Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 22 22:04:30 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Jan 22 22:04:30 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Jan 22 22:04:30 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Jan 22 22:04:30 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Jan 22 22:04:30 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Jan 22 22:04:30 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Jan 22 22:04:30 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jan 22 22:04:30 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 22 22:04:30 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Jan 22 22:04:30 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Jan 22 22:04:30 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Jan 22 22:04:30 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Jan 22 22:04:30 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Jan 22 22:04:30 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Jan 22 22:04:30 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Jan 22 22:04:30 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Jan 22 22:04:30 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Jan 22 22:04:30 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Jan 22 22:04:30 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Jan 22 22:04:30 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Jan 22 22:04:30 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jan 22 22:04:30 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jan 22 22:04:30 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jan 22 22:04:30 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jan 22 22:04:30 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jan 22 22:04:30 localhost kernel: iommu: Default domain type: Translated Jan 22 22:04:30 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jan 22 22:04:30 localhost kernel: SCSI subsystem initialized Jan 22 22:04:30 localhost kernel: ACPI: bus type USB registered Jan 22 22:04:30 localhost kernel: usbcore: registered new interface driver usbfs Jan 22 22:04:30 localhost kernel: usbcore: registered new interface driver hub Jan 22 22:04:30 localhost kernel: usbcore: registered new device driver usb Jan 22 22:04:30 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Jan 22 22:04:30 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jan 22 22:04:30 localhost kernel: PTP clock support registered Jan 22 22:04:30 localhost kernel: EDAC MC: Ver: 3.0.0 Jan 22 22:04:30 localhost kernel: NetLabel: Initializing Jan 22 22:04:30 localhost kernel: NetLabel: domain hash size = 128 Jan 22 22:04:30 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Jan 22 22:04:30 localhost kernel: NetLabel: unlabeled traffic allowed by default Jan 22 22:04:30 localhost kernel: PCI: Using ACPI for IRQ routing Jan 22 22:04:30 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Jan 22 22:04:30 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 22 22:04:30 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jan 22 22:04:30 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 22 22:04:30 localhost kernel: vgaarb: loaded Jan 22 22:04:30 localhost kernel: clocksource: Switched to clocksource kvm-clock Jan 22 22:04:30 localhost kernel: VFS: Disk quotas dquot_6.6.0 Jan 22 22:04:30 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 22 22:04:30 localhost kernel: pnp: PnP ACPI init Jan 22 22:04:30 localhost kernel: pnp 00:03: [dma 2] Jan 22 22:04:30 localhost kernel: pnp: PnP ACPI: found 5 devices Jan 22 22:04:30 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 22 22:04:30 localhost kernel: NET: Registered PF_INET protocol family Jan 22 22:04:30 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jan 22 22:04:30 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jan 22 22:04:30 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jan 22 22:04:30 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jan 22 22:04:30 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jan 22 22:04:30 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Jan 22 22:04:30 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Jan 22 22:04:30 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jan 22 22:04:30 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jan 22 22:04:30 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jan 22 22:04:30 localhost kernel: NET: Registered PF_XDP protocol family Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Jan 22 22:04:30 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Jan 22 22:04:30 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jan 22 22:04:30 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jan 22 22:04:30 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jan 22 22:04:30 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 95355 usecs Jan 22 22:04:30 localhost kernel: PCI: CLS 0 bytes, default 64 Jan 22 22:04:30 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jan 22 22:04:30 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Jan 22 22:04:30 localhost kernel: ACPI: bus type thunderbolt registered Jan 22 22:04:30 localhost kernel: Trying to unpack rootfs image as initramfs... Jan 22 22:04:30 localhost kernel: Initialise system trusted keyrings Jan 22 22:04:30 localhost kernel: Key type blacklist registered Jan 22 22:04:30 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Jan 22 22:04:30 localhost kernel: zbud: loaded Jan 22 22:04:30 localhost kernel: integrity: Platform Keyring initialized Jan 22 22:04:30 localhost kernel: integrity: Machine keyring initialized Jan 22 22:04:30 localhost kernel: Freeing initrd memory: 87956K Jan 22 22:04:30 localhost kernel: NET: Registered PF_ALG protocol family Jan 22 22:04:30 localhost kernel: xor: automatically using best checksumming function avx Jan 22 22:04:30 localhost kernel: Key type asymmetric registered Jan 22 22:04:30 localhost kernel: Asymmetric key parser 'x509' registered Jan 22 22:04:30 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Jan 22 22:04:30 localhost kernel: io scheduler mq-deadline registered Jan 22 22:04:30 localhost kernel: io scheduler kyber registered Jan 22 22:04:30 localhost kernel: io scheduler bfq registered Jan 22 22:04:30 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Jan 22 22:04:30 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Jan 22 22:04:30 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Jan 22 22:04:30 localhost kernel: ACPI: button: Power Button [PWRF] Jan 22 22:04:30 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jan 22 22:04:30 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jan 22 22:04:30 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jan 22 22:04:30 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 22 22:04:30 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 22 22:04:30 localhost kernel: Non-volatile memory driver v1.3 Jan 22 22:04:30 localhost kernel: rdac: device handler registered Jan 22 22:04:30 localhost kernel: hp_sw: device handler registered Jan 22 22:04:30 localhost kernel: emc: device handler registered Jan 22 22:04:30 localhost kernel: alua: device handler registered Jan 22 22:04:30 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Jan 22 22:04:30 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Jan 22 22:04:30 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Jan 22 22:04:30 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Jan 22 22:04:30 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Jan 22 22:04:30 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jan 22 22:04:30 localhost kernel: usb usb1: Product: UHCI Host Controller Jan 22 22:04:30 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-661.el9.x86_64 uhci_hcd Jan 22 22:04:30 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Jan 22 22:04:30 localhost kernel: hub 1-0:1.0: USB hub found Jan 22 22:04:30 localhost kernel: hub 1-0:1.0: 2 ports detected Jan 22 22:04:30 localhost kernel: usbcore: registered new interface driver usbserial_generic Jan 22 22:04:30 localhost kernel: usbserial: USB Serial support registered for generic Jan 22 22:04:30 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 22 22:04:30 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 22 22:04:30 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 22 22:04:30 localhost kernel: mousedev: PS/2 mouse device common for all mice Jan 22 22:04:30 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 22 22:04:30 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Jan 22 22:04:30 localhost kernel: rtc_cmos 00:04: registered as rtc0 Jan 22 22:04:30 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-01-23T03:04:29 UTC (1769137469) Jan 22 22:04:30 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Jan 22 22:04:30 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Jan 22 22:04:30 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Jan 22 22:04:30 localhost kernel: usbcore: registered new interface driver usbhid Jan 22 22:04:30 localhost kernel: usbhid: USB HID core driver Jan 22 22:04:30 localhost kernel: drop_monitor: Initializing network drop monitor service Jan 22 22:04:30 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Jan 22 22:04:30 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Jan 22 22:04:30 localhost kernel: Initializing XFRM netlink socket Jan 22 22:04:30 localhost kernel: NET: Registered PF_INET6 protocol family Jan 22 22:04:30 localhost kernel: Segment Routing with IPv6 Jan 22 22:04:30 localhost kernel: NET: Registered PF_PACKET protocol family Jan 22 22:04:30 localhost kernel: mpls_gso: MPLS GSO support Jan 22 22:04:30 localhost kernel: IPI shorthand broadcast: enabled Jan 22 22:04:30 localhost kernel: AVX2 version of gcm_enc/dec engaged. Jan 22 22:04:30 localhost kernel: AES CTR mode by8 optimization enabled Jan 22 22:04:30 localhost kernel: sched_clock: Marking stable (1322008819, 144076921)->(1591995499, -125909759) Jan 22 22:04:30 localhost kernel: registered taskstats version 1 Jan 22 22:04:30 localhost kernel: Loading compiled-in X.509 certificates Jan 22 22:04:30 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 04453f216699002fd63185eeab832de990bee6d7' Jan 22 22:04:30 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Jan 22 22:04:30 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Jan 22 22:04:30 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Jan 22 22:04:30 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Jan 22 22:04:30 localhost kernel: Demotion targets for Node 0: null Jan 22 22:04:30 localhost kernel: page_owner is disabled Jan 22 22:04:30 localhost kernel: Key type .fscrypt registered Jan 22 22:04:30 localhost kernel: Key type fscrypt-provisioning registered Jan 22 22:04:30 localhost kernel: Key type big_key registered Jan 22 22:04:30 localhost kernel: Key type encrypted registered Jan 22 22:04:30 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Jan 22 22:04:30 localhost kernel: Loading compiled-in module X.509 certificates Jan 22 22:04:30 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 04453f216699002fd63185eeab832de990bee6d7' Jan 22 22:04:30 localhost kernel: ima: Allocated hash algorithm: sha256 Jan 22 22:04:30 localhost kernel: ima: No architecture policies found Jan 22 22:04:30 localhost kernel: evm: Initialising EVM extended attributes: Jan 22 22:04:30 localhost kernel: evm: security.selinux Jan 22 22:04:30 localhost kernel: evm: security.SMACK64 (disabled) Jan 22 22:04:30 localhost kernel: evm: security.SMACK64EXEC (disabled) Jan 22 22:04:30 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Jan 22 22:04:30 localhost kernel: evm: security.SMACK64MMAP (disabled) Jan 22 22:04:30 localhost kernel: evm: security.apparmor (disabled) Jan 22 22:04:30 localhost kernel: evm: security.ima Jan 22 22:04:30 localhost kernel: evm: security.capability Jan 22 22:04:30 localhost kernel: evm: HMAC attrs: 0x1 Jan 22 22:04:30 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Jan 22 22:04:30 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Jan 22 22:04:30 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Jan 22 22:04:30 localhost kernel: usb 1-1: Product: QEMU USB Tablet Jan 22 22:04:30 localhost kernel: usb 1-1: Manufacturer: QEMU Jan 22 22:04:30 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Jan 22 22:04:30 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Jan 22 22:04:30 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Jan 22 22:04:30 localhost kernel: Running certificate verification RSA selftest Jan 22 22:04:30 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Jan 22 22:04:30 localhost kernel: Running certificate verification ECDSA selftest Jan 22 22:04:30 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Jan 22 22:04:30 localhost kernel: clk: Disabling unused clocks Jan 22 22:04:30 localhost kernel: Freeing unused decrypted memory: 2028K Jan 22 22:04:30 localhost kernel: Freeing unused kernel image (initmem) memory: 4200K Jan 22 22:04:30 localhost kernel: Write protecting the kernel read-only data: 30720k Jan 22 22:04:30 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 420K Jan 22 22:04:30 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Jan 22 22:04:30 localhost kernel: Run /init as init process Jan 22 22:04:30 localhost kernel: with arguments: Jan 22 22:04:30 localhost kernel: /init Jan 22 22:04:30 localhost kernel: with environment: Jan 22 22:04:30 localhost kernel: HOME=/ Jan 22 22:04:30 localhost kernel: TERM=linux Jan 22 22:04:30 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 Jan 22 22:04:30 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 22:04:30 localhost systemd[1]: Detected virtualization kvm. Jan 22 22:04:30 localhost systemd[1]: Detected architecture x86-64. Jan 22 22:04:30 localhost systemd[1]: Running in initrd. Jan 22 22:04:30 localhost systemd[1]: No hostname configured, using default hostname. Jan 22 22:04:30 localhost systemd[1]: Hostname set to . Jan 22 22:04:30 localhost systemd[1]: Initializing machine ID from VM UUID. Jan 22 22:04:30 localhost systemd[1]: Queued start job for default target Initrd Default Target. Jan 22 22:04:30 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 22:04:30 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 22 22:04:30 localhost systemd[1]: Reached target Initrd /usr File System. Jan 22 22:04:30 localhost systemd[1]: Reached target Local File Systems. Jan 22 22:04:30 localhost systemd[1]: Reached target Path Units. Jan 22 22:04:30 localhost systemd[1]: Reached target Slice Units. Jan 22 22:04:30 localhost systemd[1]: Reached target Swaps. Jan 22 22:04:30 localhost systemd[1]: Reached target Timer Units. Jan 22 22:04:30 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 22 22:04:30 localhost systemd[1]: Listening on Journal Socket (/dev/log). Jan 22 22:04:30 localhost systemd[1]: Listening on Journal Socket. Jan 22 22:04:30 localhost systemd[1]: Listening on udev Control Socket. Jan 22 22:04:30 localhost systemd[1]: Listening on udev Kernel Socket. Jan 22 22:04:30 localhost systemd[1]: Reached target Socket Units. Jan 22 22:04:30 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 22 22:04:30 localhost systemd[1]: Starting Journal Service... Jan 22 22:04:30 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Jan 22 22:04:30 localhost systemd[1]: Starting Apply Kernel Variables... Jan 22 22:04:30 localhost systemd[1]: Starting Create System Users... Jan 22 22:04:30 localhost systemd[1]: Starting Setup Virtual Console... Jan 22 22:04:30 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 22 22:04:30 localhost systemd[1]: Finished Apply Kernel Variables. Jan 22 22:04:30 localhost systemd[1]: Finished Create System Users. Jan 22 22:04:30 localhost systemd-journald[305]: Journal started Jan 22 22:04:30 localhost systemd-journald[305]: Runtime Journal (/run/log/journal/d4d5a8f721014ad4bdb29e6f214b1a06) is 8.0M, max 153.6M, 145.6M free. Jan 22 22:04:30 localhost systemd-sysusers[310]: Creating group 'users' with GID 100. Jan 22 22:04:30 localhost systemd-sysusers[310]: Creating group 'dbus' with GID 81. Jan 22 22:04:30 localhost systemd-sysusers[310]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Jan 22 22:04:30 localhost systemd[1]: Started Journal Service. Jan 22 22:04:30 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 22:04:30 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 22 22:04:30 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 22:04:30 localhost systemd[1]: Finished Setup Virtual Console. Jan 22 22:04:30 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Jan 22 22:04:30 localhost systemd[1]: Starting dracut cmdline hook... Jan 22 22:04:30 localhost dracut-cmdline[325]: dracut-9 dracut-057-102.git20250818.el9 Jan 22 22:04:30 localhost dracut-cmdline[325]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 root=UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Jan 22 22:04:30 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 22 22:04:30 localhost systemd[1]: Finished dracut cmdline hook. Jan 22 22:04:30 localhost systemd[1]: Starting dracut pre-udev hook... Jan 22 22:04:30 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jan 22 22:04:30 localhost kernel: device-mapper: uevent: version 1.0.3 Jan 22 22:04:30 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Jan 22 22:04:31 localhost kernel: RPC: Registered named UNIX socket transport module. Jan 22 22:04:31 localhost kernel: RPC: Registered udp transport module. Jan 22 22:04:31 localhost kernel: RPC: Registered tcp transport module. Jan 22 22:04:31 localhost kernel: RPC: Registered tcp-with-tls transport module. Jan 22 22:04:31 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jan 22 22:04:31 localhost rpc.statd[446]: Version 2.5.4 starting Jan 22 22:04:31 localhost rpc.statd[446]: Initializing NSM state Jan 22 22:04:31 localhost rpc.idmapd[451]: Setting log level to 0 Jan 22 22:04:31 localhost systemd[1]: Finished dracut pre-udev hook. Jan 22 22:04:31 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 22:04:31 localhost systemd-udevd[464]: Using default interface naming scheme 'rhel-9.0'. Jan 22 22:04:31 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 22:04:31 localhost systemd[1]: Starting dracut pre-trigger hook... Jan 22 22:04:31 localhost systemd[1]: Finished dracut pre-trigger hook. Jan 22 22:04:31 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 22 22:04:31 localhost systemd[1]: Created slice Slice /system/modprobe. Jan 22 22:04:31 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 22 22:04:31 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 22 22:04:31 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 22:04:31 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 22 22:04:31 localhost systemd[1]: Mounting Kernel Configuration File System... Jan 22 22:04:31 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 22 22:04:31 localhost systemd[1]: Reached target Network. Jan 22 22:04:31 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 22 22:04:31 localhost kernel: libata version 3.00 loaded. Jan 22 22:04:31 localhost systemd[1]: Starting dracut initqueue hook... Jan 22 22:04:31 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Jan 22 22:04:31 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Jan 22 22:04:31 localhost kernel: scsi host0: ata_piix Jan 22 22:04:31 localhost systemd[1]: Mounted Kernel Configuration File System. Jan 22 22:04:31 localhost systemd[1]: Reached target System Initialization. Jan 22 22:04:31 localhost systemd[1]: Reached target Basic System. Jan 22 22:04:31 localhost kernel: scsi host1: ata_piix Jan 22 22:04:31 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Jan 22 22:04:31 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Jan 22 22:04:31 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Jan 22 22:04:31 localhost kernel: vda: vda1 Jan 22 22:04:31 localhost kernel: ata1: found unknown device (class 0) Jan 22 22:04:31 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 22 22:04:31 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 22 22:04:31 localhost systemd-udevd[476]: Network interface NamePolicy= disabled on kernel command line. Jan 22 22:04:31 localhost systemd[1]: Found device /dev/disk/by-uuid/22ac9141-3960-4912-b20e-19fc8a328d40. Jan 22 22:04:31 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Jan 22 22:04:31 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 22 22:04:31 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 22 22:04:31 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Jan 22 22:04:31 localhost systemd[1]: Reached target Initrd Root Device. Jan 22 22:04:31 localhost systemd[1]: Finished dracut initqueue hook. Jan 22 22:04:32 localhost systemd[1]: Reached target Preparation for Remote File Systems. Jan 22 22:04:32 localhost systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 22:04:32 localhost systemd[1]: Reached target Remote File Systems. Jan 22 22:04:32 localhost systemd[1]: Starting dracut pre-mount hook... Jan 22 22:04:32 localhost systemd[1]: Finished dracut pre-mount hook. Jan 22 22:04:32 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/22ac9141-3960-4912-b20e-19fc8a328d40... Jan 22 22:04:32 localhost systemd-fsck[554]: /usr/sbin/fsck.xfs: XFS file system. Jan 22 22:04:32 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/22ac9141-3960-4912-b20e-19fc8a328d40. Jan 22 22:04:32 localhost systemd[1]: Mounting /sysroot... Jan 22 22:04:32 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Jan 22 22:04:32 localhost kernel: XFS (vda1): Mounting V5 Filesystem 22ac9141-3960-4912-b20e-19fc8a328d40 Jan 22 22:04:32 localhost kernel: XFS (vda1): Ending clean mount Jan 22 22:04:32 localhost systemd[1]: Mounted /sysroot. Jan 22 22:04:32 localhost systemd[1]: Reached target Initrd Root File System. Jan 22 22:04:32 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Jan 22 22:04:32 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Jan 22 22:04:32 localhost systemd[1]: Reached target Initrd File Systems. Jan 22 22:04:32 localhost systemd[1]: Reached target Initrd Default Target. Jan 22 22:04:32 localhost systemd[1]: Starting dracut mount hook... Jan 22 22:04:32 localhost systemd[1]: Finished dracut mount hook. Jan 22 22:04:32 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 22 22:04:32 localhost rpc.idmapd[451]: exiting on signal 15 Jan 22 22:04:32 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 22 22:04:32 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 22 22:04:32 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 22 22:04:32 localhost systemd[1]: Stopped target Network. Jan 22 22:04:32 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Jan 22 22:04:32 localhost systemd[1]: Stopped target Timer Units. Jan 22 22:04:32 localhost systemd[1]: dbus.socket: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Jan 22 22:04:32 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 22 22:04:32 localhost systemd[1]: Stopped target Initrd Default Target. Jan 22 22:04:32 localhost systemd[1]: Stopped target Basic System. Jan 22 22:04:32 localhost systemd[1]: Stopped target Initrd Root Device. Jan 22 22:04:32 localhost systemd[1]: Stopped target Initrd /usr File System. Jan 22 22:04:32 localhost systemd[1]: Stopped target Path Units. Jan 22 22:04:32 localhost systemd[1]: Stopped target Remote File Systems. Jan 22 22:04:32 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Jan 22 22:04:32 localhost systemd[1]: Stopped target Slice Units. Jan 22 22:04:32 localhost systemd[1]: Stopped target Socket Units. Jan 22 22:04:32 localhost systemd[1]: Stopped target System Initialization. Jan 22 22:04:32 localhost systemd[1]: Stopped target Local File Systems. Jan 22 22:04:32 localhost systemd[1]: Stopped target Swaps. Jan 22 22:04:32 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped dracut mount hook. Jan 22 22:04:32 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped dracut pre-mount hook. Jan 22 22:04:32 localhost systemd[1]: Stopped target Local Encrypted Volumes. Jan 22 22:04:32 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 22 22:04:32 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped dracut initqueue hook. Jan 22 22:04:32 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Apply Kernel Variables. Jan 22 22:04:32 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Create Volatile Files and Directories. Jan 22 22:04:32 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Coldplug All udev Devices. Jan 22 22:04:32 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped dracut pre-trigger hook. Jan 22 22:04:32 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 22 22:04:32 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Setup Virtual Console. Jan 22 22:04:32 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 22 22:04:32 localhost systemd[1]: systemd-udevd.service: Consumed 1.137s CPU time. Jan 22 22:04:32 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Closed udev Control Socket. Jan 22 22:04:32 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Closed udev Kernel Socket. Jan 22 22:04:32 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped dracut pre-udev hook. Jan 22 22:04:32 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped dracut cmdline hook. Jan 22 22:04:32 localhost systemd[1]: Starting Cleanup udev Database... Jan 22 22:04:32 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 22 22:04:32 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Create List of Static Device Nodes. Jan 22 22:04:32 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Stopped Create System Users. Jan 22 22:04:32 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 22 22:04:32 localhost systemd[1]: Finished Cleanup udev Database. Jan 22 22:04:32 localhost systemd[1]: Reached target Switch Root. Jan 22 22:04:32 localhost systemd[1]: Starting Switch Root... Jan 22 22:04:33 localhost systemd[1]: Switching root. Jan 22 22:04:33 localhost systemd-journald[305]: Journal stopped Jan 22 22:04:33 localhost systemd-journald[305]: Received SIGTERM from PID 1 (systemd). Jan 22 22:04:33 localhost kernel: audit: type=1404 audit(1769137473.126:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Jan 22 22:04:33 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:04:33 localhost kernel: SELinux: policy capability open_perms=1 Jan 22 22:04:33 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:04:33 localhost kernel: SELinux: policy capability always_check_network=0 Jan 22 22:04:33 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:04:33 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:04:33 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:04:33 localhost kernel: audit: type=1403 audit(1769137473.268:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 22 22:04:33 localhost systemd[1]: Successfully loaded SELinux policy in 145.367ms. Jan 22 22:04:33 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 28.616ms. Jan 22 22:04:33 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 22:04:33 localhost systemd[1]: Detected virtualization kvm. Jan 22 22:04:33 localhost systemd[1]: Detected architecture x86-64. Jan 22 22:04:33 localhost systemd-rc-local-generator[637]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:04:33 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 22 22:04:33 localhost systemd[1]: Stopped Switch Root. Jan 22 22:04:33 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 22 22:04:33 localhost systemd[1]: Created slice Slice /system/getty. Jan 22 22:04:33 localhost systemd[1]: Created slice Slice /system/serial-getty. Jan 22 22:04:33 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Jan 22 22:04:33 localhost systemd[1]: Created slice User and Session Slice. Jan 22 22:04:33 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 22:04:33 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 22 22:04:33 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 22 22:04:33 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 22 22:04:33 localhost systemd[1]: Stopped target Switch Root. Jan 22 22:04:33 localhost systemd[1]: Stopped target Initrd File Systems. Jan 22 22:04:33 localhost systemd[1]: Stopped target Initrd Root File System. Jan 22 22:04:33 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Jan 22 22:04:33 localhost systemd[1]: Reached target Path Units. Jan 22 22:04:33 localhost systemd[1]: Reached target rpc_pipefs.target. Jan 22 22:04:33 localhost systemd[1]: Reached target Slice Units. Jan 22 22:04:33 localhost systemd[1]: Reached target Swaps. Jan 22 22:04:33 localhost systemd[1]: Reached target Local Verity Protected Volumes. Jan 22 22:04:33 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Jan 22 22:04:33 localhost systemd[1]: Reached target RPC Port Mapper. Jan 22 22:04:33 localhost systemd[1]: Listening on Process Core Dump Socket. Jan 22 22:04:33 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 22 22:04:33 localhost systemd[1]: Listening on udev Control Socket. Jan 22 22:04:33 localhost systemd[1]: Listening on udev Kernel Socket. Jan 22 22:04:33 localhost systemd[1]: Mounting Huge Pages File System... Jan 22 22:04:33 localhost systemd[1]: Mounting POSIX Message Queue File System... Jan 22 22:04:33 localhost systemd[1]: Mounting Kernel Debug File System... Jan 22 22:04:33 localhost systemd[1]: Mounting Kernel Trace File System... Jan 22 22:04:33 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 22 22:04:33 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 22 22:04:33 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 22 22:04:33 localhost systemd[1]: Starting Load Kernel Module drm... Jan 22 22:04:33 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Jan 22 22:04:33 localhost systemd[1]: Starting Load Kernel Module fuse... Jan 22 22:04:33 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Jan 22 22:04:33 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 22 22:04:33 localhost systemd[1]: Stopped File System Check on Root Device. Jan 22 22:04:33 localhost systemd[1]: Stopped Journal Service. Jan 22 22:04:33 localhost systemd[1]: Starting Journal Service... Jan 22 22:04:33 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Jan 22 22:04:33 localhost systemd[1]: Starting Generate network units from Kernel command line... Jan 22 22:04:33 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 22 22:04:33 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Jan 22 22:04:33 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Jan 22 22:04:33 localhost systemd[1]: Starting Apply Kernel Variables... Jan 22 22:04:33 localhost kernel: fuse: init (API version 7.37) Jan 22 22:04:33 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 22 22:04:33 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Jan 22 22:04:33 localhost systemd[1]: Mounted Huge Pages File System. Jan 22 22:04:33 localhost systemd[1]: Mounted POSIX Message Queue File System. Jan 22 22:04:33 localhost systemd[1]: Mounted Kernel Debug File System. Jan 22 22:04:33 localhost systemd[1]: Mounted Kernel Trace File System. Jan 22 22:04:33 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 22 22:04:33 localhost systemd-journald[678]: Journal started Jan 22 22:04:33 localhost systemd-journald[678]: Runtime Journal (/run/log/journal/85ac68c10a6e7ae08ceb898dbdca0cb5) is 8.0M, max 153.6M, 145.6M free. Jan 22 22:04:33 localhost systemd[1]: Queued start job for default target Multi-User System. Jan 22 22:04:33 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Jan 22 22:04:33 localhost systemd[1]: Started Journal Service. Jan 22 22:04:33 localhost kernel: ACPI: bus type drm_connector registered Jan 22 22:04:33 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 22:04:33 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 22 22:04:33 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 22 22:04:33 localhost systemd[1]: Finished Load Kernel Module drm. Jan 22 22:04:33 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jan 22 22:04:33 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Jan 22 22:04:33 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 22 22:04:33 localhost systemd[1]: Finished Load Kernel Module fuse. Jan 22 22:04:33 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Jan 22 22:04:33 localhost systemd[1]: Finished Generate network units from Kernel command line. Jan 22 22:04:33 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Jan 22 22:04:33 localhost systemd[1]: Finished Apply Kernel Variables. Jan 22 22:04:33 localhost systemd[1]: Mounting FUSE Control File System... Jan 22 22:04:33 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 22 22:04:33 localhost systemd[1]: Starting Rebuild Hardware Database... Jan 22 22:04:33 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Jan 22 22:04:33 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jan 22 22:04:33 localhost systemd[1]: Starting Load/Save OS Random Seed... Jan 22 22:04:33 localhost systemd[1]: Starting Create System Users... Jan 22 22:04:33 localhost systemd-journald[678]: Runtime Journal (/run/log/journal/85ac68c10a6e7ae08ceb898dbdca0cb5) is 8.0M, max 153.6M, 145.6M free. Jan 22 22:04:33 localhost systemd-journald[678]: Received client request to flush runtime journal. Jan 22 22:04:33 localhost systemd[1]: Mounted FUSE Control File System. Jan 22 22:04:33 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Jan 22 22:04:33 localhost systemd[1]: Finished Load/Save OS Random Seed. Jan 22 22:04:33 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 22 22:04:33 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 22 22:04:33 localhost systemd[1]: Finished Create System Users. Jan 22 22:04:33 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 22:04:34 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 22:04:34 localhost systemd[1]: Reached target Preparation for Local File Systems. Jan 22 22:04:34 localhost systemd[1]: Reached target Local File Systems. Jan 22 22:04:34 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 22 22:04:34 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Jan 22 22:04:34 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 22 22:04:34 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Jan 22 22:04:34 localhost systemd[1]: Starting Automatic Boot Loader Update... Jan 22 22:04:34 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Jan 22 22:04:34 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 22 22:04:34 localhost bootctl[697]: Couldn't find EFI system partition, skipping. Jan 22 22:04:34 localhost systemd[1]: Finished Automatic Boot Loader Update. Jan 22 22:04:34 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 22 22:04:34 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 22 22:04:34 localhost systemd[1]: Starting Security Auditing Service... Jan 22 22:04:34 localhost systemd[1]: Starting RPC Bind... Jan 22 22:04:34 localhost systemd[1]: Starting Rebuild Journal Catalog... Jan 22 22:04:34 localhost auditd[704]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Jan 22 22:04:34 localhost auditd[704]: Init complete, auditd 3.1.5 listening for events (startup state enable) Jan 22 22:04:34 localhost systemd[1]: Started RPC Bind. Jan 22 22:04:34 localhost systemd[1]: Finished Rebuild Journal Catalog. Jan 22 22:04:34 localhost augenrules[709]: /sbin/augenrules: No change Jan 22 22:04:34 localhost augenrules[724]: No rules Jan 22 22:04:34 localhost augenrules[724]: enabled 1 Jan 22 22:04:34 localhost augenrules[724]: failure 1 Jan 22 22:04:34 localhost augenrules[724]: pid 704 Jan 22 22:04:34 localhost augenrules[724]: rate_limit 0 Jan 22 22:04:34 localhost augenrules[724]: backlog_limit 8192 Jan 22 22:04:34 localhost augenrules[724]: lost 0 Jan 22 22:04:34 localhost augenrules[724]: backlog 0 Jan 22 22:04:34 localhost augenrules[724]: backlog_wait_time 60000 Jan 22 22:04:34 localhost augenrules[724]: backlog_wait_time_actual 0 Jan 22 22:04:34 localhost augenrules[724]: enabled 1 Jan 22 22:04:34 localhost augenrules[724]: failure 1 Jan 22 22:04:34 localhost augenrules[724]: pid 704 Jan 22 22:04:34 localhost augenrules[724]: rate_limit 0 Jan 22 22:04:34 localhost augenrules[724]: backlog_limit 8192 Jan 22 22:04:34 localhost augenrules[724]: lost 0 Jan 22 22:04:34 localhost augenrules[724]: backlog 0 Jan 22 22:04:34 localhost augenrules[724]: backlog_wait_time 60000 Jan 22 22:04:34 localhost augenrules[724]: backlog_wait_time_actual 0 Jan 22 22:04:34 localhost augenrules[724]: enabled 1 Jan 22 22:04:34 localhost augenrules[724]: failure 1 Jan 22 22:04:34 localhost augenrules[724]: pid 704 Jan 22 22:04:34 localhost augenrules[724]: rate_limit 0 Jan 22 22:04:34 localhost augenrules[724]: backlog_limit 8192 Jan 22 22:04:34 localhost augenrules[724]: lost 0 Jan 22 22:04:34 localhost augenrules[724]: backlog 1 Jan 22 22:04:34 localhost augenrules[724]: backlog_wait_time 60000 Jan 22 22:04:34 localhost augenrules[724]: backlog_wait_time_actual 0 Jan 22 22:04:34 localhost systemd[1]: Started Security Auditing Service. Jan 22 22:04:34 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 22 22:04:34 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 22 22:04:34 localhost systemd[1]: Finished Rebuild Hardware Database. Jan 22 22:04:34 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 22:04:34 localhost systemd[1]: Starting Update is Completed... Jan 22 22:04:34 localhost systemd[1]: Finished Update is Completed. Jan 22 22:04:34 localhost systemd-udevd[732]: Using default interface naming scheme 'rhel-9.0'. Jan 22 22:04:34 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 22:04:34 localhost systemd[1]: Reached target System Initialization. Jan 22 22:04:34 localhost systemd[1]: Started dnf makecache --timer. Jan 22 22:04:34 localhost systemd[1]: Started Daily rotation of log files. Jan 22 22:04:34 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 22 22:04:34 localhost systemd[1]: Reached target Timer Units. Jan 22 22:04:34 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 22 22:04:34 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Jan 22 22:04:34 localhost systemd[1]: Reached target Socket Units. Jan 22 22:04:34 localhost systemd[1]: Starting D-Bus System Message Bus... Jan 22 22:04:34 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 22 22:04:34 localhost systemd-udevd[743]: Network interface NamePolicy= disabled on kernel command line. Jan 22 22:04:34 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 22 22:04:34 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 22:04:34 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 22 22:04:34 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Jan 22 22:04:34 localhost systemd[1]: Started D-Bus System Message Bus. Jan 22 22:04:34 localhost systemd[1]: Reached target Basic System. Jan 22 22:04:34 localhost dbus-broker-lau[770]: Ready Jan 22 22:04:34 localhost systemd[1]: Starting NTP client/server... Jan 22 22:04:34 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jan 22 22:04:34 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jan 22 22:04:34 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jan 22 22:04:34 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Jan 22 22:04:34 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Jan 22 22:04:34 localhost chronyd[785]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Jan 22 22:04:34 localhost chronyd[785]: Loaded 0 symmetric keys Jan 22 22:04:34 localhost chronyd[785]: Using right/UTC timezone to obtain leap second data Jan 22 22:04:34 localhost chronyd[785]: Loaded seccomp filter (level 2) Jan 22 22:04:34 localhost systemd[1]: Starting IPv4 firewall with iptables... Jan 22 22:04:34 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Jan 22 22:04:34 localhost systemd[1]: Started irqbalance daemon. Jan 22 22:04:34 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Jan 22 22:04:34 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 22:04:34 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 22:04:34 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 22:04:34 localhost systemd[1]: Reached target sshd-keygen.target. Jan 22 22:04:34 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Jan 22 22:04:34 localhost systemd[1]: Reached target User and Group Name Lookups. Jan 22 22:04:34 localhost systemd[1]: Starting User Login Management... Jan 22 22:04:34 localhost systemd[1]: Started NTP client/server. Jan 22 22:04:34 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Jan 22 22:04:34 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Jan 22 22:04:34 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Jan 22 22:04:34 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Jan 22 22:04:34 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Jan 22 22:04:34 localhost kernel: kvm_amd: TSC scaling supported Jan 22 22:04:34 localhost kernel: kvm_amd: Nested Virtualization enabled Jan 22 22:04:34 localhost kernel: kvm_amd: Nested Paging enabled Jan 22 22:04:34 localhost kernel: kvm_amd: LBR virtualization supported Jan 22 22:04:34 localhost systemd-logind[801]: Watching system buttons on /dev/input/event0 (Power Button) Jan 22 22:04:34 localhost systemd-logind[801]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 22 22:04:34 localhost kernel: Console: switching to colour dummy device 80x25 Jan 22 22:04:34 localhost systemd-logind[801]: New seat seat0. Jan 22 22:04:34 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Jan 22 22:04:34 localhost kernel: [drm] features: -context_init Jan 22 22:04:34 localhost systemd[1]: Started User Login Management. Jan 22 22:04:34 localhost kernel: [drm] number of scanouts: 1 Jan 22 22:04:34 localhost kernel: [drm] number of cap sets: 0 Jan 22 22:04:34 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Jan 22 22:04:34 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Jan 22 22:04:34 localhost kernel: Console: switching to colour frame buffer device 128x48 Jan 22 22:04:34 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Jan 22 22:04:34 localhost iptables.init[783]: iptables: Applying firewall rules: [ OK ] Jan 22 22:04:34 localhost systemd[1]: Finished IPv4 firewall with iptables. Jan 22 22:04:35 localhost cloud-init[840]: Cloud-init v. 24.4-8.el9 running 'init-local' at Fri, 23 Jan 2026 03:04:35 +0000. Up 6.84 seconds. Jan 22 22:04:35 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Jan 22 22:04:35 localhost kernel: ISO 9660 Extensions: RRIP_1991A Jan 22 22:04:35 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpnl5t14q5.mount: Deactivated successfully. Jan 22 22:04:35 localhost systemd[1]: Starting Hostname Service... Jan 22 22:04:35 localhost systemd[1]: Started Hostname Service. Jan 22 22:04:35 np0005592985.novalocal systemd-hostnamed[854]: Hostname set to (static) Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Reached target Preparation for Network. Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Starting Network Manager... Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.6855] NetworkManager (version 1.54.3-2.el9) is starting... (boot:d7e3ff95-d799-48b2-a365-e6d40cec8520) Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.6861] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.6975] manager[0x56239cd48000]: monitoring kernel firmware directory '/lib/firmware'. Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7027] hostname: hostname: using hostnamed Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7028] hostname: static hostname changed from (none) to "np0005592985.novalocal" Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7035] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7231] manager[0x56239cd48000]: rfkill: Wi-Fi hardware radio set enabled Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7232] manager[0x56239cd48000]: rfkill: WWAN hardware radio set enabled Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7296] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-device-plugin-team.so) Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7297] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7298] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7298] manager: Networking is enabled by state file Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7301] settings: Loaded settings plugin: keyfile (internal) Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7320] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-settings-plugin-ifcfg-rh.so") Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7355] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7372] dhcp: init: Using DHCP client 'internal' Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7376] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7400] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7413] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7427] device (lo): Activation: starting connection 'lo' (923a660f-ba91-4254-9ee6-2c8e7d7cf29c) Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7443] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7448] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7492] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7498] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7504] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7508] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7512] device (eth0): carrier: link connected Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7518] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7527] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7539] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Started Network Manager. Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7545] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7546] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7550] manager: NetworkManager state is now CONNECTING Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7559] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Reached target Network. Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7572] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7578] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Starting Network Manager Wait Online... Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7660] dhcp4 (eth0): state changed new lease, address=38.102.83.224 Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7677] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7708] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7747] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7750] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7758] device (lo): Activation: successful, device activated. Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7774] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7779] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7786] manager: NetworkManager state is now CONNECTED_SITE Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7792] device (eth0): Activation: successful, device activated. Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7800] manager: NetworkManager state is now CONNECTED_GLOBAL Jan 22 22:04:35 np0005592985.novalocal NetworkManager[858]: [1769137475.7805] manager: startup complete Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Jan 22 22:04:35 np0005592985.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Reached target NFS client services. Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Reached target Remote File Systems. Jan 22 22:04:35 np0005592985.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Finished Network Manager Wait Online. Jan 22 22:04:35 np0005592985.novalocal systemd[1]: Starting Cloud-init: Network Stage... Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: Cloud-init v. 24.4-8.el9 running 'init' at Fri, 23 Jan 2026 03:04:36 +0000. Up 7.84 seconds. Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | eth0 | True | 38.102.83.224 | 255.255.255.0 | global | fa:16:3e:8c:20:cf | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | eth0 | True | fe80::f816:3eff:fe8c:20cf/64 | . | link | fa:16:3e:8c:20:cf | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | lo | True | ::1/128 | . | host | . | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | Route | Destination | Gateway | Interface | Flags | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: | 3 | multicast | :: | eth0 | U | Jan 22 22:04:36 np0005592985.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 22 22:04:36 np0005592985.novalocal useradd[990]: new group: name=cloud-user, GID=1001 Jan 22 22:04:36 np0005592985.novalocal useradd[990]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Jan 22 22:04:36 np0005592985.novalocal useradd[990]: add 'cloud-user' to group 'adm' Jan 22 22:04:36 np0005592985.novalocal useradd[990]: add 'cloud-user' to group 'systemd-journal' Jan 22 22:04:36 np0005592985.novalocal useradd[990]: add 'cloud-user' to shadow group 'adm' Jan 22 22:04:36 np0005592985.novalocal useradd[990]: add 'cloud-user' to shadow group 'systemd-journal' Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Generating public/private rsa key pair. Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: The key fingerprint is: Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: SHA256:8VBVutJetTs1EfCFQl4QzKX1aSPLLstcpQ5AfGTYuio root@np0005592985.novalocal Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: The key's randomart image is: Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: +---[RSA 3072]----+ Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | +B=**o.| Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | .ooo+=o.+| Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | oo..+o *o| Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | .=....+.+| Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | S.+ oo.+.| Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | ..o..o +| Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | . o.+ o | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | E . o * .| Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | . + . | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: +----[SHA256]-----+ Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Generating public/private ecdsa key pair. Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: The key fingerprint is: Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: SHA256:9J4r3b+m6aYjh46JvE6OfSwIX6fk3HuIY4X9nelkpMw root@np0005592985.novalocal Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: The key's randomart image is: Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: +---[ECDSA 256]---+ Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | . | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | . . | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | o S o | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: |. + +o + . | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | o *.B oE+=+ | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | o*O.=o*oB.o.. | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | .oB=++.=+=++o. | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: +----[SHA256]-----+ Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Generating public/private ed25519 key pair. Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: The key fingerprint is: Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: SHA256:IZYZkWz6hSD8TWhjZMPUkzakarMSLNO4sOeskOo7Yv4 root@np0005592985.novalocal Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: The key's randomart image is: Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: +--[ED25519 256]--+ Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | . +==++ | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | o.Bo@+ | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: | =.O=+. | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: |.o .o.o... | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: |*.= . .S | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: |oB o . | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: |* o | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: |+B | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: |B=*E | Jan 22 22:04:37 np0005592985.novalocal cloud-init[922]: +----[SHA256]-----+ Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Finished Cloud-init: Network Stage. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Reached target Cloud-config availability. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Reached target Network is Online. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Starting Cloud-init: Config Stage... Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Starting Crash recovery kernel arming... Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Starting Notify NFS peers of a restart... Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Starting System Logging Service... Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Starting OpenSSH server daemon... Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Starting Permit User Sessions... Jan 22 22:04:37 np0005592985.novalocal sm-notify[1006]: Version 2.5.4 starting Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Started Notify NFS peers of a restart. Jan 22 22:04:37 np0005592985.novalocal sshd[1008]: Server listening on 0.0.0.0 port 22. Jan 22 22:04:37 np0005592985.novalocal sshd[1008]: Server listening on :: port 22. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Started OpenSSH server daemon. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Finished Permit User Sessions. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Started Command Scheduler. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Started Getty on tty1. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Started Serial Getty on ttyS0. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Reached target Login Prompts. Jan 22 22:04:37 np0005592985.novalocal crond[1012]: (CRON) STARTUP (1.5.7) Jan 22 22:04:37 np0005592985.novalocal crond[1012]: (CRON) INFO (Syslog will be used instead of sendmail.) Jan 22 22:04:37 np0005592985.novalocal crond[1012]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 76% if used.) Jan 22 22:04:37 np0005592985.novalocal crond[1012]: (CRON) INFO (running with inotify support) Jan 22 22:04:37 np0005592985.novalocal sshd-session[1011]: Connection reset by 38.102.83.114 port 54052 [preauth] Jan 22 22:04:37 np0005592985.novalocal rsyslogd[1007]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1007" x-info="https://www.rsyslog.com"] start Jan 22 22:04:37 np0005592985.novalocal rsyslogd[1007]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Started System Logging Service. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Reached target Multi-User System. Jan 22 22:04:37 np0005592985.novalocal sshd-session[1017]: Unable to negotiate with 38.102.83.114 port 54060: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Jan 22 22:04:37 np0005592985.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 22 22:04:37 np0005592985.novalocal sshd-session[1038]: Unable to negotiate with 38.102.83.114 port 54082: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Jan 22 22:04:37 np0005592985.novalocal sshd-session[1051]: Unable to negotiate with 38.102.83.114 port 54096: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Jan 22 22:04:37 np0005592985.novalocal rsyslogd[1007]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Jan 22 22:04:37 np0005592985.novalocal sshd-session[1071]: Connection reset by 38.102.83.114 port 54116 [preauth] Jan 22 22:04:37 np0005592985.novalocal sshd-session[1078]: Unable to negotiate with 38.102.83.114 port 54130: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Jan 22 22:04:37 np0005592985.novalocal sshd-session[1029]: Connection closed by 38.102.83.114 port 54076 [preauth] Jan 22 22:04:37 np0005592985.novalocal kdumpctl[1019]: kdump: No kdump initial ramdisk found. Jan 22 22:04:37 np0005592985.novalocal kdumpctl[1019]: kdump: Rebuilding /boot/initramfs-5.14.0-661.el9.x86_64kdump.img Jan 22 22:04:37 np0005592985.novalocal sshd-session[1081]: Unable to negotiate with 38.102.83.114 port 54136: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Jan 22 22:04:37 np0005592985.novalocal sshd-session[1058]: Connection closed by 38.102.83.114 port 54108 [preauth] Jan 22 22:04:37 np0005592985.novalocal cloud-init[1121]: Cloud-init v. 24.4-8.el9 running 'modules:config' at Fri, 23 Jan 2026 03:04:37 +0000. Up 9.53 seconds. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Finished Cloud-init: Config Stage. Jan 22 22:04:37 np0005592985.novalocal systemd[1]: Starting Cloud-init: Final Stage... Jan 22 22:04:38 np0005592985.novalocal cloud-init[1269]: Cloud-init v. 24.4-8.el9 running 'modules:final' at Fri, 23 Jan 2026 03:04:38 +0000. Up 9.94 seconds. Jan 22 22:04:38 np0005592985.novalocal cloud-init[1288]: ############################################################# Jan 22 22:04:38 np0005592985.novalocal cloud-init[1291]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Jan 22 22:04:38 np0005592985.novalocal dracut[1290]: dracut-057-102.git20250818.el9 Jan 22 22:04:38 np0005592985.novalocal cloud-init[1295]: 256 SHA256:9J4r3b+m6aYjh46JvE6OfSwIX6fk3HuIY4X9nelkpMw root@np0005592985.novalocal (ECDSA) Jan 22 22:04:38 np0005592985.novalocal cloud-init[1302]: 256 SHA256:IZYZkWz6hSD8TWhjZMPUkzakarMSLNO4sOeskOo7Yv4 root@np0005592985.novalocal (ED25519) Jan 22 22:04:38 np0005592985.novalocal cloud-init[1312]: 3072 SHA256:8VBVutJetTs1EfCFQl4QzKX1aSPLLstcpQ5AfGTYuio root@np0005592985.novalocal (RSA) Jan 22 22:04:38 np0005592985.novalocal cloud-init[1313]: -----END SSH HOST KEY FINGERPRINTS----- Jan 22 22:04:38 np0005592985.novalocal cloud-init[1314]: ############################################################# Jan 22 22:04:38 np0005592985.novalocal cloud-init[1269]: Cloud-init v. 24.4-8.el9 finished at Fri, 23 Jan 2026 03:04:38 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.18 seconds Jan 22 22:04:38 np0005592985.novalocal systemd[1]: Finished Cloud-init: Final Stage. Jan 22 22:04:38 np0005592985.novalocal systemd[1]: Reached target Cloud-init target. Jan 22 22:04:38 np0005592985.novalocal dracut[1294]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/22ac9141-3960-4912-b20e-19fc8a328d40 /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-661.el9.x86_64kdump.img 5.14.0-661.el9.x86_64 Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: Module 'resume' will not be installed, because it's in the list to be omitted! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Jan 22 22:04:39 np0005592985.novalocal dracut[1294]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: memstrack is not available Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: memstrack is not available Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: *** Including module: systemd *** Jan 22 22:04:40 np0005592985.novalocal chronyd[785]: Selected source 206.108.0.133 (2.centos.pool.ntp.org) Jan 22 22:04:40 np0005592985.novalocal chronyd[785]: System clock TAI offset set to 37 seconds Jan 22 22:04:40 np0005592985.novalocal dracut[1294]: *** Including module: fips *** Jan 22 22:04:41 np0005592985.novalocal dracut[1294]: *** Including module: systemd-initrd *** Jan 22 22:04:41 np0005592985.novalocal dracut[1294]: *** Including module: i18n *** Jan 22 22:04:41 np0005592985.novalocal dracut[1294]: *** Including module: drm *** Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: *** Including module: prefixdevname *** Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: *** Including module: kernel-modules *** Jan 22 22:04:42 np0005592985.novalocal kernel: block vda: the capability attribute has been deprecated. Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: *** Including module: kernel-modules-extra *** Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: *** Including module: qemu *** Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: *** Including module: fstab-sys *** Jan 22 22:04:42 np0005592985.novalocal dracut[1294]: *** Including module: rootfs-block *** Jan 22 22:04:43 np0005592985.novalocal dracut[1294]: *** Including module: terminfo *** Jan 22 22:04:43 np0005592985.novalocal dracut[1294]: *** Including module: udev-rules *** Jan 22 22:04:43 np0005592985.novalocal dracut[1294]: Skipping udev rule: 91-permissions.rules Jan 22 22:04:43 np0005592985.novalocal dracut[1294]: Skipping udev rule: 80-drivers-modprobe.rules Jan 22 22:04:43 np0005592985.novalocal dracut[1294]: *** Including module: virtiofs *** Jan 22 22:04:43 np0005592985.novalocal dracut[1294]: *** Including module: dracut-systemd *** Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: *** Including module: usrmount *** Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: *** Including module: base *** Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: *** Including module: fs-lib *** Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: *** Including module: kdumpbase *** Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: *** Including module: microcode_ctl-fw_dir_override *** Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: microcode_ctl module: mangling fw_dir Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel" is ignored Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-2d-07" is ignored Jan 22 22:04:44 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-4e-03" is ignored Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-4f-01" is ignored Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-55-04" is ignored Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-5e-03" is ignored Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-8c-01" is ignored Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: Cannot change IRQ 25 affinity: Operation not permitted Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: IRQ 25 affinity is now unmanaged Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: Cannot change IRQ 31 affinity: Operation not permitted Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: IRQ 31 affinity is now unmanaged Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: Cannot change IRQ 28 affinity: Operation not permitted Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: IRQ 28 affinity is now unmanaged Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: Cannot change IRQ 32 affinity: Operation not permitted Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: IRQ 32 affinity is now unmanaged Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: Cannot change IRQ 30 affinity: Operation not permitted Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: IRQ 30 affinity is now unmanaged Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: Cannot change IRQ 29 affinity: Operation not permitted Jan 22 22:04:45 np0005592985.novalocal irqbalance[795]: IRQ 29 affinity is now unmanaged Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: configuration "intel-06-8f-08" is ignored Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: *** Including module: openssl *** Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: *** Including module: shutdown *** Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: *** Including module: squash *** Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: *** Including modules done *** Jan 22 22:04:45 np0005592985.novalocal dracut[1294]: *** Installing kernel module dependencies *** Jan 22 22:04:45 np0005592985.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 22 22:04:46 np0005592985.novalocal dracut[1294]: *** Installing kernel module dependencies done *** Jan 22 22:04:46 np0005592985.novalocal dracut[1294]: *** Resolving executable dependencies *** Jan 22 22:04:48 np0005592985.novalocal dracut[1294]: *** Resolving executable dependencies done *** Jan 22 22:04:48 np0005592985.novalocal dracut[1294]: *** Generating early-microcode cpio image *** Jan 22 22:04:48 np0005592985.novalocal dracut[1294]: *** Store current command line parameters *** Jan 22 22:04:48 np0005592985.novalocal dracut[1294]: Stored kernel commandline: Jan 22 22:04:48 np0005592985.novalocal dracut[1294]: No dracut internal kernel commandline stored in the initramfs Jan 22 22:04:48 np0005592985.novalocal dracut[1294]: *** Install squash loader *** Jan 22 22:04:49 np0005592985.novalocal sshd-session[4085]: Accepted publickey for zuul-worker from 38.102.83.114 port 45630 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Jan 22 22:04:49 np0005592985.novalocal systemd[1]: Created slice User Slice of UID 1000. Jan 22 22:04:49 np0005592985.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Jan 22 22:04:49 np0005592985.novalocal systemd-logind[801]: New session 1 of user zuul-worker. Jan 22 22:04:49 np0005592985.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Jan 22 22:04:49 np0005592985.novalocal systemd[1]: Starting User Manager for UID 1000... Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Queued start job for default target Main User Target. Jan 22 22:04:49 np0005592985.novalocal dracut[1294]: *** Squashing the files inside the initramfs *** Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Created slice User Application Slice. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Started Mark boot as successful after the user session has run 2 minutes. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Started Daily Cleanup of User's Temporary Directories. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Reached target Paths. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Reached target Timers. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Starting D-Bus User Message Bus Socket... Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Starting Create User's Volatile Files and Directories... Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Finished Create User's Volatile Files and Directories. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Listening on D-Bus User Message Bus Socket. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Reached target Sockets. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Reached target Basic System. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Reached target Main User Target. Jan 22 22:04:49 np0005592985.novalocal systemd[4089]: Startup finished in 146ms. Jan 22 22:04:49 np0005592985.novalocal systemd[1]: Started User Manager for UID 1000. Jan 22 22:04:49 np0005592985.novalocal systemd[1]: Started Session 1 of User zuul-worker. Jan 22 22:04:49 np0005592985.novalocal sshd-session[4085]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Jan 22 22:04:50 np0005592985.novalocal python3[4238]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: *** Squashing the files inside the initramfs done *** Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: *** Creating image file '/boot/initramfs-5.14.0-661.el9.x86_64kdump.img' *** Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: *** Hardlinking files *** Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: Mode: real Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: Files: 50 Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: Linked: 0 files Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: Compared: 0 xattrs Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: Compared: 0 files Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: Saved: 0 B Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: Duration: 0.000815 seconds Jan 22 22:04:50 np0005592985.novalocal dracut[1294]: *** Hardlinking files done *** Jan 22 22:04:51 np0005592985.novalocal dracut[1294]: *** Creating initramfs image file '/boot/initramfs-5.14.0-661.el9.x86_64kdump.img' done *** Jan 22 22:04:51 np0005592985.novalocal kdumpctl[1019]: kdump: kexec: loaded kdump kernel Jan 22 22:04:51 np0005592985.novalocal kdumpctl[1019]: kdump: Starting kdump: [OK] Jan 22 22:04:51 np0005592985.novalocal systemd[1]: Finished Crash recovery kernel arming. Jan 22 22:04:51 np0005592985.novalocal systemd[1]: Startup finished in 1.804s (kernel) + 3.070s (initrd) + 18.529s (userspace) = 23.404s. Jan 22 22:04:52 np0005592985.novalocal python3[4418]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 22 22:04:56 np0005592985.novalocal python3[4476]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 22 22:04:57 np0005592985.novalocal python3[4516]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Jan 22 22:04:58 np0005592985.novalocal python3[4542]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCl5TzavTtMuuGlbj9CSexfvjIjeJR/4i53DNEuSTkOHtnaMQow0VvpNPGRF9EHmvbVF6MKzvW3tqza+uibSg2w070N+Wkii8Dy0t/yNIXwjI0ugXS1/g8UySDpPhh3MT255Sf56/NVMwBQzGF8Q9HqifbmAXu7gQDj38TBjLrbps6aHxViURRsxov8A//y4QSgW14PZ0qDxbnY8TxWnjH8UWV37McufLOL6aG66Sptr3xUjL2Zb8S+szOZQus36twPKQHot9/1lBKOE8MecdUeQt+c7VINpdBZ29SH9veb1acGz0IjjVGZk13eoKY678EYSjlnNjNl2wLvkz2jwq0yAzMmRT/3qkeYxDYiBcmaajEdWzi5cnjReqlYyMSvuirtZJAF1QkiPMX3qOjRr3oLZswvP48j38KrBvCqnU8Klg9CehtG+ouW5bhsyGo2/ZrbGymthFKeWZQtgkO/SXhK52ZQ3YODc3SVepeQn1APxUkFUVri2pnZggNjFzP7VLU= zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 22 22:04:59 np0005592985.novalocal python3[4566]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:04:59 np0005592985.novalocal python3[4665]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 22:05:00 np0005592985.novalocal python3[4736]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769137499.3871505-163-40723126054784/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=05f6376799b84054ba01ccee478fcc97_id_rsa follow=False checksum=30160d6410e8de956944117c3320de399337c9a5 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:00 np0005592985.novalocal python3[4859]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 22:05:01 np0005592985.novalocal python3[4930]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769137500.3595812-174-142438536611435/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=05f6376799b84054ba01ccee478fcc97_id_rsa.pub follow=False checksum=84c41f511f3e6882211942238d40cc51327599c5 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:02 np0005592985.novalocal python3[4978]: ansible-ping Invoked with data=pong Jan 22 22:05:03 np0005592985.novalocal python3[5002]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 22 22:05:04 np0005592985.novalocal python3[5060]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Jan 22 22:05:05 np0005592985.novalocal python3[5092]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:05 np0005592985.novalocal python3[5116]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:05 np0005592985.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 22 22:05:05 np0005592985.novalocal python3[5140]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:06 np0005592985.novalocal python3[5166]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:06 np0005592985.novalocal python3[5190]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:06 np0005592985.novalocal python3[5214]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:08 np0005592985.novalocal python3[5238]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Jan 22 22:05:09 np0005592985.novalocal sshd-session[5241]: Accepted publickey for zuul-worker from 38.102.83.114 port 46220 ssh2: RSA SHA256:HZkl+feCjiZH0MVterRhtwf2mfM1jxZh5JGHtvqMg2s Jan 22 22:05:09 np0005592985.novalocal systemd-logind[801]: New session 3 of user zuul-worker. Jan 22 22:05:09 np0005592985.novalocal systemd[1]: Started Session 3 of User zuul-worker. Jan 22 22:05:09 np0005592985.novalocal sshd-session[5241]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Jan 22 22:05:11 np0005592985.novalocal sshd-session[5244]: Received disconnect from 38.102.83.114 port 46220:11: disconnected by user Jan 22 22:05:11 np0005592985.novalocal sshd-session[5244]: Disconnected from user zuul-worker 38.102.83.114 port 46220 Jan 22 22:05:11 np0005592985.novalocal sshd-session[5241]: pam_unix(sshd:session): session closed for user zuul-worker Jan 22 22:05:11 np0005592985.novalocal systemd[1]: session-3.scope: Deactivated successfully. Jan 22 22:05:11 np0005592985.novalocal systemd[1]: session-3.scope: Consumed 1.951s CPU time. Jan 22 22:05:11 np0005592985.novalocal systemd-logind[801]: Session 3 logged out. Waiting for processes to exit. Jan 22 22:05:11 np0005592985.novalocal systemd-logind[801]: Removed session 3. Jan 22 22:05:12 np0005592985.novalocal python3[5292]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:12 np0005592985.novalocal python3[5316]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:12 np0005592985.novalocal python3[5340]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:12 np0005592985.novalocal python3[5364]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:13 np0005592985.novalocal python3[5388]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:13 np0005592985.novalocal python3[5412]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:13 np0005592985.novalocal python3[5437]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ef9-e89a-c691-da2b-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:05:13 np0005592985.novalocal sudo[5438]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Jan 22 22:05:13 np0005592985.novalocal sudo[5438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:13 np0005592985.novalocal sudo[5438]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:14 np0005592985.novalocal python3[5466]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:15 np0005592985.novalocal sudo[5542]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-otntkilbojquujhognysyahvhdpvwrsg ; /usr/bin/python3' Jan 22 22:05:15 np0005592985.novalocal sudo[5542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:15 np0005592985.novalocal python3[5544]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 22:05:15 np0005592985.novalocal sudo[5542]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:15 np0005592985.novalocal sudo[5615]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-asitlrvtesjeslemjotinbjafpbcxewv ; /usr/bin/python3' Jan 22 22:05:15 np0005592985.novalocal sudo[5615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:15 np0005592985.novalocal python3[5617]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769137514.8146226-91-95175427864229/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:15 np0005592985.novalocal sudo[5615]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:16 np0005592985.novalocal sudo[5717]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gbnmknqtoickwoelmxuuvwzqjkizylcf ; /usr/bin/python3' Jan 22 22:05:16 np0005592985.novalocal sudo[5717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:16 np0005592985.novalocal python3[5719]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 22:05:16 np0005592985.novalocal sudo[5717]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:16 np0005592985.novalocal sudo[5792]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aldfqhxjoniepuimdsgdlqpvijnfqtwi ; /usr/bin/python3' Jan 22 22:05:16 np0005592985.novalocal sudo[5792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:16 np0005592985.novalocal python3[5794]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769137515.9598472-103-209816138143232/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:16 np0005592985.novalocal sudo[5792]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:17 np0005592985.novalocal sudo[5894]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ypgjaopkghvjhdicsjhacdivpplsqpxc ; /usr/bin/python3' Jan 22 22:05:17 np0005592985.novalocal sudo[5894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:17 np0005592985.novalocal python3[5896]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 22:05:17 np0005592985.novalocal sudo[5894]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:17 np0005592985.novalocal sudo[5969]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-muxavyhdsapqltlhjfzfpnuclatnycct ; /usr/bin/python3' Jan 22 22:05:17 np0005592985.novalocal sudo[5969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:17 np0005592985.novalocal python3[5971]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769137516.969852-103-240176333640097/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:17 np0005592985.novalocal sudo[5969]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:18 np0005592985.novalocal sudo[6019]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gkxwdrxxpqestgnuecfdqoadwjkbqpfb ; /usr/bin/python3' Jan 22 22:05:18 np0005592985.novalocal sudo[6019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:18 np0005592985.novalocal python3[6021]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:18 np0005592985.novalocal python3[6021]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Jan 22 22:05:18 np0005592985.novalocal sudo[6019]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:18 np0005592985.novalocal sudo[6045]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eqlbnszohnylabjjjjfjnhmubkiyvsqo ; /usr/bin/python3' Jan 22 22:05:18 np0005592985.novalocal sudo[6045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:18 np0005592985.novalocal python3[6047]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:05:19 np0005592985.novalocal sudo[6045]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:19 np0005592985.novalocal sudo[6073]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ztujljbipuujayxjzfhujcznphuamehp ; /usr/bin/python3' Jan 22 22:05:19 np0005592985.novalocal sudo[6073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:19 np0005592985.novalocal python3[6075]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:05:34 np0005592985.novalocal sudo[6073]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:36 np0005592985.novalocal python3[6116]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:36 np0005592985.novalocal python3[6141]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ef9-e89a-32b8-a5f3-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 22 22:05:37 np0005592985.novalocal sudo[6169]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bcsoehtofgbbamqzbqvrbfmncfnjvfto ; /usr/bin/python3' Jan 22 22:05:37 np0005592985.novalocal sudo[6169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:37 np0005592985.novalocal python3[6171]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 22:05:38 np0005592985.novalocal sudo[6169]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:39 np0005592985.novalocal python3[6203]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ef9-e89a-32b8-a5f3-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 22 22:05:40 np0005592985.novalocal python3[6231]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ef9-e89a-32b8-a5f3-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 22 22:05:41 np0005592985.novalocal python3[6259]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ef9-e89a-32b8-a5f3-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:05:44 np0005592985.novalocal python3[6291]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ef9-e89a-32b8-a5f3-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:05:47 np0005592985.novalocal python3[6321]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ef9-e89a-32b8-a5f3-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:05:47 np0005592985.novalocal sudo[6348]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hjsordtonhcitoiwgjpcliqnqsxiihku ; /usr/bin/python3' Jan 22 22:05:47 np0005592985.novalocal sudo[6348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:47 np0005592985.novalocal python3[6350]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:47 np0005592985.novalocal sudo[6348]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:47 np0005592985.novalocal python3[6375]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ef9-e89a-32b8-a5f3-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:05:49 np0005592985.novalocal sudo[6407]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oloxmuiqruvlvqdyrbppcxjatejvbccw ; /usr/bin/python3' Jan 22 22:05:49 np0005592985.novalocal sudo[6407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:49 np0005592985.novalocal python3[6410]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:49 np0005592985.novalocal sudo[6407]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:50 np0005592985.novalocal sudo[6486]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hyghbxvspcizkwieuonaxzeiqmbhgfar ; /usr/bin/python3' Jan 22 22:05:50 np0005592985.novalocal sudo[6486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:50 np0005592985.novalocal python3[6488]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 22 22:05:50 np0005592985.novalocal sudo[6486]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:50 np0005592985.novalocal sudo[6559]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jzggmtzvtrowrwxcmbjlynotcjhhovdf ; /usr/bin/python3' Jan 22 22:05:50 np0005592985.novalocal sudo[6559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:50 np0005592985.novalocal python3[6561]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1769137550.040089-81-100244598183594/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 22 22:05:50 np0005592985.novalocal sudo[6559]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:51 np0005592985.novalocal sudo[6610]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cdqdlywndnmkbczfeifkhqqtynjhxgfg ; /usr/bin/python3' Jan 22 22:05:51 np0005592985.novalocal sudo[6610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:05:51 np0005592985.novalocal python3[6612]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ef9-e89a-32b8-a5f3-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:05:51 np0005592985.novalocal sudo[6610]: pam_unix(sudo:session): session closed for user root Jan 22 22:05:52 np0005592985.novalocal python3[6639]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Jan 22 22:05:58 np0005592985.novalocal python3[6672]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="dalmatian" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-dalmatian-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163ef9-e89a-32b8-a5f3-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:07:03 np0005592985.novalocal sudo[6956]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jnfgdjrmdrsfryoxneampooyewlrubbb ; /usr/bin/python3' Jan 22 22:07:03 np0005592985.novalocal sudo[6956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:04 np0005592985.novalocal python3[6958]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Jan 22 22:07:04 np0005592985.novalocal sudo[6956]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:04 np0005592985.novalocal sudo[6996]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sauqhunbumdsjlbloyppuyrsnstenurx ; /usr/bin/python3' Jan 22 22:07:04 np0005592985.novalocal sudo[6996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:04 np0005592985.novalocal python3[6998]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:07:04 np0005592985.novalocal python3[6998]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Jan 22 22:07:04 np0005592985.novalocal sudo[6999]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Jan 22 22:07:04 np0005592985.novalocal sudo[6999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:07:04 np0005592985.novalocal sudo[6999]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:05 np0005592985.novalocal sudo[6996]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:05 np0005592985.novalocal sudo[7009]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rgablctutminoykdlxvkspmazpwqndkm ; /usr/bin/python3' Jan 22 22:07:05 np0005592985.novalocal sudo[7009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:05 np0005592985.novalocal python3[7011]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Jan 22 22:07:05 np0005592985.novalocal sudo[7009]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:05 np0005592985.novalocal sudo[7021]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eaypzczstwgmydswsdtstjrfwvatvaaw ; /usr/bin/python3' Jan 22 22:07:05 np0005592985.novalocal sudo[7021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:06 np0005592985.novalocal python3[7023]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 22:07:06 np0005592985.novalocal sudo[7021]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:06 np0005592985.novalocal sudo[7039]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pnvvgmhjizshslnugamkymlofgamqkmc ; /usr/bin/python3' Jan 22 22:07:06 np0005592985.novalocal sudo[7039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:07 np0005592985.novalocal python3[7041]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 22:07:09 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:07:09 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:07:09 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:07:10 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:07:10 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:07:10 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:07:10 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:07:10 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:07:10 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:07:10 np0005592985.novalocal systemd-rc-local-generator[7113]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:07:10 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:07:12 np0005592985.novalocal sudo[7039]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:12 np0005592985.novalocal sudo[9052]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jsbwsvejkymwskaeibxltrxnlfsqjdzx ; /usr/bin/python3' Jan 22 22:07:12 np0005592985.novalocal sudo[9052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:12 np0005592985.novalocal python3[9092]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Jan 22 22:07:12 np0005592985.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Jan 22 22:07:13 np0005592985.novalocal systemd[1]: Starting Authorization Manager... Jan 22 22:07:13 np0005592985.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Jan 22 22:07:13 np0005592985.novalocal polkitd[10003]: Started polkitd version 0.117 Jan 22 22:07:13 np0005592985.novalocal sudo[9052]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:13 np0005592985.novalocal polkitd[10003]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 22:07:13 np0005592985.novalocal polkitd[10003]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 22:07:13 np0005592985.novalocal polkitd[10003]: Finished loading, compiling and executing 2 rules Jan 22 22:07:13 np0005592985.novalocal polkitd[10003]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jan 22 22:07:13 np0005592985.novalocal systemd[1]: Started Authorization Manager. Jan 22 22:07:13 np0005592985.novalocal sudo[10145]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vhefjtfelflfidbrnvgqldbthvozipzf ; /usr/bin/python3' Jan 22 22:07:13 np0005592985.novalocal sudo[10145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:13 np0005592985.novalocal python3[10165]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:07:13 np0005592985.novalocal sudo[10145]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:13 np0005592985.novalocal sudo[10535]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uafwdrcjugpbirdldilolgaqzfgxgjoo ; /usr/bin/python3' Jan 22 22:07:13 np0005592985.novalocal sudo[10535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:14 np0005592985.novalocal python3[10537]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:07:15 np0005592985.novalocal sudo[10535]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:15 np0005592985.novalocal sudo[11615]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nmjmonjnzyygovjhwfylrcohwzkoqipo ; /usr/bin/python3' Jan 22 22:07:15 np0005592985.novalocal sudo[11615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:15 np0005592985.novalocal python3[11634]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 22:07:15 np0005592985.novalocal sudo[11615]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:15 np0005592985.novalocal sudo[11794]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-brghotgswlmqejfivfkiwfnshgvjuofd ; /usr/bin/python3' Jan 22 22:07:15 np0005592985.novalocal sudo[11794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:15 np0005592985.novalocal python3[11822]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 22:07:15 np0005592985.novalocal sudo[11794]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:16 np0005592985.novalocal sudo[12314]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jgrqyilcwtoqxmidjpvxiaqhwswcwriw ; /usr/bin/python3' Jan 22 22:07:16 np0005592985.novalocal sudo[12314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:16 np0005592985.novalocal python3[12327]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-dalmatian/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 22:07:16 np0005592985.novalocal sudo[12314]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:16 np0005592985.novalocal sudo[12636]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cscauxsqnbjbasoxmftvwpdigmcupdwc ; /usr/bin/python3' Jan 22 22:07:16 np0005592985.novalocal sudo[12636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:16 np0005592985.novalocal python3[12657]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-dalmatian/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 22:07:17 np0005592985.novalocal sudo[12636]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:17 np0005592985.novalocal sudo[12844]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lfqvaypthmnavjxzvlzotqduozdqcipl ; /usr/bin/python3' Jan 22 22:07:17 np0005592985.novalocal sudo[12844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:17 np0005592985.novalocal python3[12861]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:07:17 np0005592985.novalocal sudo[12844]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:17 np0005592985.novalocal sudo[13245]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xfmwjqebjzqeznxapzjujhousjjvlgyy ; /usr/bin/python3' Jan 22 22:07:17 np0005592985.novalocal sudo[13245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:17 np0005592985.novalocal python3[13260]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:07:20 np0005592985.novalocal sudo[13245]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:20 np0005592985.novalocal sudo[14351]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-duxnqvliolrfwdjqcyanjgyumgpzvlbk ; /usr/bin/python3' Jan 22 22:07:20 np0005592985.novalocal sudo[14351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:20 np0005592985.novalocal python3[14360]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 22 22:07:20 np0005592985.novalocal python3[14360]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Jan 22 22:07:21 np0005592985.novalocal sudo[14351]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:21 np0005592985.novalocal sudo[14623]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gsiomvlkegkeiukbszzsonuaunciwtft ; /usr/bin/python3' Jan 22 22:07:21 np0005592985.novalocal sudo[14623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:21 np0005592985.novalocal python3[14635]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 22:07:25 np0005592985.novalocal irqbalance[795]: Cannot change IRQ 27 affinity: Operation not permitted Jan 22 22:07:25 np0005592985.novalocal irqbalance[795]: IRQ 27 affinity is now unmanaged Jan 22 22:07:41 np0005592985.novalocal systemd[4089]: Starting Mark boot as successful... Jan 22 22:07:41 np0005592985.novalocal systemd[4089]: Finished Mark boot as successful. Jan 22 22:07:45 np0005592985.novalocal irqbalance[795]: Cannot change IRQ 26 affinity: Operation not permitted Jan 22 22:07:45 np0005592985.novalocal irqbalance[795]: IRQ 26 affinity is now unmanaged Jan 22 22:07:50 np0005592985.novalocal sudo[14623]: pam_unix(sudo:session): session closed for user root Jan 22 22:07:51 np0005592985.novalocal sudo[24126]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xljitztgcahdetbplydwfjlfvmsgaipv ; /usr/bin/python3' Jan 22 22:07:51 np0005592985.novalocal sudo[24126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:07:51 np0005592985.novalocal python3[24134]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 22:08:04 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:08:04 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:08:04 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 1min 4.786s CPU time. Jan 22 22:08:04 np0005592985.novalocal systemd[1]: run-r02bb2e6284a64d0f9bfe280417b0a82e.service: Deactivated successfully. Jan 22 22:08:06 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:08:06 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:08:06 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:08:58 np0005592985.novalocal groupadd[45404]: group added to /etc/group: name=rtkit, GID=172 Jan 22 22:08:58 np0005592985.novalocal groupadd[45404]: group added to /etc/gshadow: name=rtkit Jan 22 22:08:58 np0005592985.novalocal groupadd[45404]: new group: name=rtkit, GID=172 Jan 22 22:08:58 np0005592985.novalocal useradd[45412]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Jan 22 22:08:58 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:08:58 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:08:58 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:08:59 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:08:59 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:09:09 np0005592985.novalocal kernel: SELinux: Converting 448 SID table entries... Jan 22 22:09:09 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:09:09 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:09:09 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:09:09 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:09:09 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:09:09 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:09:09 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:09:18 np0005592985.novalocal groupadd[45483]: group added to /etc/group: name=geoclue, GID=994 Jan 22 22:09:18 np0005592985.novalocal groupadd[45483]: group added to /etc/gshadow: name=geoclue Jan 22 22:09:18 np0005592985.novalocal groupadd[45483]: new group: name=geoclue, GID=994 Jan 22 22:09:18 np0005592985.novalocal useradd[45490]: new user: name=geoclue, UID=993, GID=994, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Jan 22 22:09:18 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:09:18 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=2 res=1 Jan 22 22:09:18 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Reloading rules Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Collecting garbage unconditionally... Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Finished loading, compiling and executing 3 rules Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Reloading rules Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Collecting garbage unconditionally... Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Finished loading, compiling and executing 3 rules Jan 22 22:09:18 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:09:18 np0005592985.novalocal groupadd[45502]: group added to /etc/group: name=flatpak, GID=993 Jan 22 22:09:18 np0005592985.novalocal groupadd[45502]: group added to /etc/gshadow: name=flatpak Jan 22 22:09:18 np0005592985.novalocal groupadd[45502]: new group: name=flatpak, GID=993 Jan 22 22:09:18 np0005592985.novalocal useradd[45509]: new user: name=flatpak, UID=992, GID=993, home=/, shell=/usr/sbin/nologin, from=none Jan 22 22:09:18 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:09:18 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:09:18 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Reloading rules Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Collecting garbage unconditionally... Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Finished loading, compiling and executing 4 rules Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Reloading rules Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Collecting garbage unconditionally... Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 22:09:18 np0005592985.novalocal polkitd[10003]: Finished loading, compiling and executing 4 rules Jan 22 22:09:20 np0005592985.novalocal sshd[1008]: Received signal 15; terminating. Jan 22 22:09:20 np0005592985.novalocal systemd[1]: Stopping OpenSSH server daemon... Jan 22 22:09:20 np0005592985.novalocal systemd[1]: sshd.service: Deactivated successfully. Jan 22 22:09:20 np0005592985.novalocal systemd[1]: Stopped OpenSSH server daemon. Jan 22 22:09:20 np0005592985.novalocal systemd[1]: Stopped target sshd-keygen.target. Jan 22 22:09:20 np0005592985.novalocal systemd[1]: Stopping sshd-keygen.target... Jan 22 22:09:20 np0005592985.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 22:09:20 np0005592985.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 22:09:20 np0005592985.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 22 22:09:20 np0005592985.novalocal systemd[1]: Reached target sshd-keygen.target. Jan 22 22:09:20 np0005592985.novalocal systemd[1]: Starting OpenSSH server daemon... Jan 22 22:09:20 np0005592985.novalocal sshd[45550]: Server listening on 0.0.0.0 port 22. Jan 22 22:09:20 np0005592985.novalocal sshd[45550]: Server listening on :: port 22. Jan 22 22:09:20 np0005592985.novalocal systemd[1]: Started OpenSSH server daemon. Jan 22 22:09:21 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:09:21 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:09:21 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:09:21 np0005592985.novalocal systemd-rc-local-generator[45657]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:09:21 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:09:24 np0005592985.novalocal sudo[24126]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:24 np0005592985.novalocal sudo[48808]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cjxlvpbfugwmbopegmxjptsvwtesajty ; /usr/bin/python3' Jan 22 22:09:24 np0005592985.novalocal sudo[48808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:25 np0005592985.novalocal python3[48846]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 22:09:29 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:09:30 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:09:30 np0005592985.novalocal systemd-rc-local-generator[53171]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:09:30 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:09:30 np0005592985.novalocal sudo[48808]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:31 np0005592985.novalocal sudo[53837]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gjmpageqtfvdlpmjbnjjljlntvwgkpas ; /usr/bin/python3' Jan 22 22:09:31 np0005592985.novalocal sudo[53837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:31 np0005592985.novalocal python3[53858]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Jan 22 22:09:31 np0005592985.novalocal sudo[53837]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:31 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:09:31 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:09:31 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 12.571s CPU time. Jan 22 22:09:31 np0005592985.novalocal systemd[1]: run-r45f718eb98d74c6db9462ea5ac9c8b78.service: Deactivated successfully. Jan 22 22:09:31 np0005592985.novalocal systemd[1]: run-rf6aed13d61fc46b3bceda2425af6d510.service: Deactivated successfully. Jan 22 22:09:31 np0005592985.novalocal sudo[53902]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-krlsubekhcpkogcwwnrvitanrgochkby ; /usr/bin/python3' Jan 22 22:09:31 np0005592985.novalocal sudo[53902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:31 np0005592985.novalocal python3[53904]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Jan 22 22:09:31 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:09:31 np0005592985.novalocal systemd-rc-local-generator[53922]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:09:32 np0005592985.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Jan 22 22:09:32 np0005592985.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Jan 22 22:09:32 np0005592985.novalocal systemd[1]: Starting Resets System Activity Logs... Jan 22 22:09:32 np0005592985.novalocal systemd[1]: Finished Resets System Activity Logs. Jan 22 22:09:32 np0005592985.novalocal sudo[53902]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:32 np0005592985.novalocal sudo[53951]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-iqbztadutcqjhseiumrwneouszwlgakz ; /usr/bin/python3' Jan 22 22:09:32 np0005592985.novalocal sudo[53951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:32 np0005592985.novalocal python3[53953]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005592985 np0005592985.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Jan 22 22:09:32 np0005592985.novalocal sudo[53951]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:32 np0005592985.novalocal sudo[53960]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-avienbtmarnzwpczwpiiqejzqeiyjlrx ; /usr/bin/python3' Jan 22 22:09:32 np0005592985.novalocal sudo[53960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:33 np0005592985.novalocal python3[53962]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 22 22:09:34 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:09:34 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:09:35 np0005592985.novalocal sudo[53960]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:35 np0005592985.novalocal sudo[54318]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cgehrqvbzymdxczlmiedirygoyxqjqvh ; /usr/bin/python3' Jan 22 22:09:35 np0005592985.novalocal sudo[54318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:35 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:09:35 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:09:35 np0005592985.novalocal python3[54320]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Jan 22 22:09:35 np0005592985.novalocal python3[54320]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Jan 22 22:09:35 np0005592985.novalocal sudo[54318]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:35 np0005592985.novalocal systemd[1]: run-r4077a1343774446ea062d0238258527e.service: Deactivated successfully. Jan 22 22:09:35 np0005592985.novalocal sudo[54332]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qqcbkxbrdflvgrslsynpvnoravgjnivz ; /usr/bin/python3' Jan 22 22:09:35 np0005592985.novalocal sudo[54332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:36 np0005592985.novalocal python3[54334]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Jan 22 22:09:36 np0005592985.novalocal python3[54334]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Jan 22 22:09:36 np0005592985.novalocal sudo[54332]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:36 np0005592985.novalocal sudo[54343]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gtdphcbwfdnhdpcsjpgxlkkfehbcvxqw ; /usr/bin/python3' Jan 22 22:09:36 np0005592985.novalocal sudo[54343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:36 np0005592985.novalocal python3[54345]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2024.2 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Jan 22 22:09:39 np0005592985.novalocal sudo[54343]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:39 np0005592985.novalocal sudo[54378]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jpyoykyxwdvmrcbtcrzamfesreibdzvb ; /usr/bin/python3' Jan 22 22:09:39 np0005592985.novalocal sudo[54378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:39 np0005592985.novalocal python3[54380]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 22:09:39 np0005592985.novalocal sudo[54378]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:40 np0005592985.novalocal sudo[54404]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-udgrbpajumurpmforefkealiafpnkivf ; /usr/bin/python3' Jan 22 22:09:40 np0005592985.novalocal sudo[54404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:40 np0005592985.novalocal python3[54406]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Jan 22 22:09:40 np0005592985.novalocal sudo[54404]: pam_unix(sudo:session): session closed for user root Jan 22 22:09:40 np0005592985.novalocal sudo[54413]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-praczciplbikwgbnzulpppralyztuceq ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Jan 22 22:09:40 np0005592985.novalocal sudo[54413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:09:40 np0005592985.novalocal python3[54415]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Jan 22 22:10:13 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:10:16 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:10:16 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:10:41 np0005592985.novalocal systemd[4089]: Created slice User Background Tasks Slice. Jan 22 22:10:41 np0005592985.novalocal systemd[4089]: Starting Cleanup of User's Temporary Files and Directories... Jan 22 22:10:42 np0005592985.novalocal systemd[4089]: Finished Cleanup of User's Temporary Files and Directories. Jan 22 22:10:49 np0005592985.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:30 across:23933836k Jan 22 22:10:53 np0005592985.novalocal groupadd[54482]: group added to /etc/group: name=puppet, GID=52 Jan 22 22:10:53 np0005592985.novalocal groupadd[54482]: group added to /etc/gshadow: name=puppet Jan 22 22:10:53 np0005592985.novalocal groupadd[54482]: new group: name=puppet, GID=52 Jan 22 22:10:53 np0005592985.novalocal useradd[54489]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Jan 22 22:10:54 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:10:54 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:10:54 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:10:54 np0005592985.novalocal systemd-rc-local-generator[54528]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:10:55 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:10:57 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:10:57 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:10:57 np0005592985.novalocal systemd[1]: run-r6225e1c1dfc64c44bcad71dd4d8b500c.service: Deactivated successfully. Jan 22 22:11:08 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:11:08 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:11:08 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:11:22 np0005592985.novalocal kernel: SELinux: Converting 480 SID table entries... Jan 22 22:11:22 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:11:22 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:11:22 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:11:22 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:11:22 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:11:22 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:11:22 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:11:23 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=3 res=1 Jan 22 22:11:23 np0005592985.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Jan 22 22:11:24 np0005592985.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Jan 22 22:11:24 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:11:24 np0005592985.novalocal systemd-rc-local-generator[55586]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:11:31 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:11:31 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:11:34 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:11:34 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:11:34 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:11:34 np0005592985.novalocal systemd-rc-local-generator[55835]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:11:34 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:11:40 np0005592985.novalocal dbus-broker-launch[774]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Jan 22 22:11:40 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:11:40 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:11:40 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.653s CPU time. Jan 22 22:11:41 np0005592985.novalocal systemd[1]: run-r9c9684d56c1a4d278b6c5f2586c2e0e0.service: Deactivated successfully. Jan 22 22:12:00 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:12:00 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:12:00 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:12:09 np0005592985.novalocal sshd-session[60785]: Received disconnect from 45.148.10.147 port 18796:11: [preauth] Jan 22 22:12:09 np0005592985.novalocal sshd-session[60785]: Disconnected from authenticating user root 45.148.10.147 port 18796 [preauth] Jan 22 22:12:43 np0005592985.novalocal setsebool[61717]: The virt_use_nfs policy boolean was changed to 1 by root Jan 22 22:12:43 np0005592985.novalocal setsebool[61717]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Jan 22 22:12:54 np0005592985.novalocal kernel: SELinux: Converting 516 SID table entries... Jan 22 22:12:54 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:12:54 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:12:54 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:12:54 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:12:54 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:12:54 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:12:54 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:13:13 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=5 res=1 Jan 22 22:13:13 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:13:13 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:13:13 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:13:58 np0005592985.novalocal kernel: SELinux: Converting 2739 SID table entries... Jan 22 22:13:58 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:13:58 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:13:58 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:13:58 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:13:58 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:13:58 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:13:58 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:14:13 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=7 res=1 Jan 22 22:14:13 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:14:13 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:14:13 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:14:34 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:14:34 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:14:35 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:14:35 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:14:35 np0005592985.novalocal systemd[1]: run-r4ac88427ad334668816ecb835c39a4b7.service: Deactivated successfully. Jan 22 22:14:46 np0005592985.novalocal kernel: SELinux: Converting 2739 SID table entries... Jan 22 22:14:46 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:14:46 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:14:46 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:14:46 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:14:46 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:14:46 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:14:46 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:14:47 np0005592985.novalocal groupadd[62768]: group added to /etc/group: name=memcached, GID=989 Jan 22 22:14:47 np0005592985.novalocal groupadd[62768]: group added to /etc/gshadow: name=memcached Jan 22 22:14:47 np0005592985.novalocal groupadd[62768]: new group: name=memcached, GID=989 Jan 22 22:14:47 np0005592985.novalocal useradd[62775]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Jan 22 22:14:49 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=8 res=1 Jan 22 22:14:49 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:14:49 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:14:49 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:14:49 np0005592985.novalocal systemd-rc-local-generator[63208]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:14:49 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:14:49 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:14:49 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:14:49 np0005592985.novalocal systemd[1]: run-rc0aa737d78944758a5c9822da7a7f15d.service: Deactivated successfully. Jan 22 22:14:50 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:14:50 np0005592985.novalocal systemd-rc-local-generator[63379]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:14:50 np0005592985.novalocal systemd[1]: Started memcached daemon. Jan 22 22:14:50 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:14:50 np0005592985.novalocal systemd-rc-local-generator[63421]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:14:50 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:14:51 np0005592985.novalocal systemd-rc-local-generator[63453]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:14:53 np0005592985.novalocal groupadd[63470]: group added to /etc/group: name=epmd, GID=988 Jan 22 22:14:53 np0005592985.novalocal groupadd[63470]: group added to /etc/gshadow: name=epmd Jan 22 22:14:53 np0005592985.novalocal groupadd[63470]: new group: name=epmd, GID=988 Jan 22 22:14:54 np0005592985.novalocal useradd[63477]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Jan 22 22:14:54 np0005592985.novalocal groupadd[63486]: group added to /etc/group: name=rabbitmq, GID=987 Jan 22 22:14:54 np0005592985.novalocal groupadd[63486]: group added to /etc/gshadow: name=rabbitmq Jan 22 22:14:54 np0005592985.novalocal groupadd[63486]: new group: name=rabbitmq, GID=987 Jan 22 22:14:54 np0005592985.novalocal useradd[63493]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Jan 22 22:14:55 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:14:56 np0005592985.novalocal systemd-rc-local-generator[63524]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:14:56 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:14:56 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:14:56 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:14:56 np0005592985.novalocal systemd-rc-local-generator[63564]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:14:57 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:14:57 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:14:57 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:14:57 np0005592985.novalocal systemd[1]: run-re872cb4f39e14412bed5ad640743da60.service: Deactivated successfully. Jan 22 22:15:00 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:15:00 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:15:00 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:15:00 np0005592985.novalocal runuser[64378]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:15:01 np0005592985.novalocal runuser[64378]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:15:16 np0005592985.novalocal kernel: SELinux: Converting 2745 SID table entries... Jan 22 22:15:16 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:15:16 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:15:16 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:15:16 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:15:16 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:15:16 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:15:16 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:15:16 np0005592985.novalocal groupadd[64889]: group added to /etc/group: name=mysql, GID=27 Jan 22 22:15:16 np0005592985.novalocal groupadd[64889]: group added to /etc/gshadow: name=mysql Jan 22 22:15:16 np0005592985.novalocal groupadd[64889]: new group: name=mysql, GID=27 Jan 22 22:15:16 np0005592985.novalocal useradd[64895]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Jan 22 22:15:18 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=9 res=1 Jan 22 22:15:18 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:15:18 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:15:18 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:15:18 np0005592985.novalocal systemd-rc-local-generator[65369]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:15:18 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:15:22 np0005592985.novalocal groupadd[68091]: group added to /etc/group: name=redis, GID=986 Jan 22 22:15:22 np0005592985.novalocal groupadd[68091]: group added to /etc/gshadow: name=redis Jan 22 22:15:22 np0005592985.novalocal groupadd[68091]: new group: name=redis, GID=986 Jan 22 22:15:22 np0005592985.novalocal useradd[68141]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Jan 22 22:15:23 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:15:23 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:15:23 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.721s CPU time. Jan 22 22:15:23 np0005592985.novalocal systemd[1]: run-r97dd60949bcf439eb9e95c196529fc33.service: Deactivated successfully. Jan 22 22:15:23 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:15:23 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:15:23 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:15:23 np0005592985.novalocal systemd-rc-local-generator[68634]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:15:24 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:15:24 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:15:24 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:15:24 np0005592985.novalocal systemd[1]: run-r219e6e1ffb4d435fb63660cce48fa872.service: Deactivated successfully. Jan 22 22:15:35 np0005592985.novalocal kernel: SELinux: Converting 2748 SID table entries... Jan 22 22:15:35 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:15:35 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:15:35 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:15:35 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:15:35 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:15:35 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:15:35 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:15:35 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=10 res=1 Jan 22 22:15:35 np0005592985.novalocal systemd[1]: Starting dnf makecache... Jan 22 22:15:35 np0005592985.novalocal groupadd[68676]: group added to /etc/group: name=unbound, GID=985 Jan 22 22:15:35 np0005592985.novalocal groupadd[68676]: group added to /etc/gshadow: name=unbound Jan 22 22:15:35 np0005592985.novalocal groupadd[68676]: new group: name=unbound, GID=985 Jan 22 22:15:35 np0005592985.novalocal useradd[68683]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Jan 22 22:15:36 np0005592985.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: Updating Subscription Management repositories. Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: Unable to read consumer identity Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: This system is not registered with an entitlement server. You can use subscription-manager to register. Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: Failed determining last makecache time. Jan 22 22:15:36 np0005592985.novalocal groupadd[68696]: group added to /etc/group: name=openvswitch, GID=984 Jan 22 22:15:36 np0005592985.novalocal groupadd[68696]: group added to /etc/gshadow: name=openvswitch Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-ansible-role-thales-hsm-0661a3a0a0e79e 184 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal groupadd[68696]: new group: name=openvswitch, GID=984 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-ironic-e9ee094fc3d37cf273bd6 186 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-cinder-90adabb6771825506a9f8 194 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-python-openstackclient-f42ade4305d9745 247 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal useradd[68706]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-cloudkitty-b7a4be00afa6a6dc2 199 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-selinux-f19cf2529160f9bf6e83 246 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-nova-19df809bb4f8baf6739a2f7 195 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-designate-5bfc35864c28a97ded 261 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-glance-097f38158189efc5c7d52 241 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal groupadd[68719]: group added to /etc/group: name=hugetlbfs, GID=983 Jan 22 22:15:36 np0005592985.novalocal groupadd[68719]: group added to /etc/gshadow: name=hugetlbfs Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-keystone-489e170f8161dac7c83 206 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal groupadd[68719]: new group: name=hugetlbfs, GID=983 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-manila-338bcb77f8d36c422e616 181 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-neutron-2ce5e3b27734931cc60c 192 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal usermod[68731]: add 'openvswitch' to group 'hugetlbfs' Jan 22 22:15:36 np0005592985.novalocal usermod[68731]: add 'openvswitch' to shadow group 'hugetlbfs' Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-octavia-577ff3d6712f0235b3fd 186 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-watcher-456f42e1b9d9abf0f620 179 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-python-tcib-c2ae956ec1898faaed6197ef95 178 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-puppet-openstacklib-98e64c6dad3b665745 175 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-openstack-swift-9d495089a7aa6c5b222037 191 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-python-tempestconf-8515371b7cceebd4282 190 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: delorean-python-django-horizon-fdaaf6e1a1708dee 188 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: CentOS Stream 9 - BaseOS 987 kB/s | 3.9 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: CentOS Stream 9 - AppStream 1.1 MB/s | 4.4 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: CentOS Stream 9 - CRB 893 kB/s | 4.3 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: CentOS Stream 9 - Extras packages 876 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: dlrn-dalmatian-testing 239 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: dlrn-dalmatian-build-deps 205 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: centos9-rabbitmq 816 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: centos9-storage 970 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: centos9-opstools 1.0 MB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: NFV SIG OpenvSwitch 995 kB/s | 3.0 kB 00:00 Jan 22 22:15:36 np0005592985.novalocal dnf[68675]: Extra Packages for Enterprise Linux 9 - x86_64 113 kB/s | 14 kB 00:00 Jan 22 22:15:38 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:15:38 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:15:38 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:15:38 np0005592985.novalocal systemd-sysv-generator[69233]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:15:38 np0005592985.novalocal systemd-rc-local-generator[69230]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:15:38 np0005592985.novalocal dnf[68675]: Extra Packages for Enterprise Linux 9 - x86_64 15 MB/s | 20 MB 00:01 Jan 22 22:15:38 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:15:39 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:15:39 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:15:39 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.414s CPU time. Jan 22 22:15:39 np0005592985.novalocal systemd[1]: run-r666422c2dbd44af4977d48cb45ec2ff7.service: Deactivated successfully. Jan 22 22:15:39 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:15:39 np0005592985.novalocal systemd-rc-local-generator[69865]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:15:39 np0005592985.novalocal systemd-sysv-generator[69868]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:15:39 np0005592985.novalocal systemd[1]: Starting Open vSwitch Database Unit... Jan 22 22:15:39 np0005592985.novalocal chown[69876]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Jan 22 22:15:39 np0005592985.novalocal ovs-ctl[69881]: /etc/openvswitch/conf.db does not exist ... (warning). Jan 22 22:15:40 np0005592985.novalocal ovs-ctl[69881]: Creating empty database /etc/openvswitch/conf.db [ OK ] Jan 22 22:15:40 np0005592985.novalocal ovs-ctl[69881]: Starting ovsdb-server [ OK ] Jan 22 22:15:40 np0005592985.novalocal ovs-vsctl[69930]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Jan 22 22:15:40 np0005592985.novalocal ovs-vsctl[69949]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-115.el9s "external-ids:system-id=\"c9338ed2-6ebf-4e8b-96d0-725598a33ea7\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Jan 22 22:15:40 np0005592985.novalocal ovs-ctl[69881]: Configuring Open vSwitch system IDs [ OK ] Jan 22 22:15:40 np0005592985.novalocal ovs-vsctl[69953]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005592985 Jan 22 22:15:40 np0005592985.novalocal ovs-ctl[69881]: Enabling remote OVSDB managers [ OK ] Jan 22 22:15:40 np0005592985.novalocal systemd[1]: Started Open vSwitch Database Unit. Jan 22 22:15:40 np0005592985.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Jan 22 22:15:40 np0005592985.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Jan 22 22:15:40 np0005592985.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Jan 22 22:15:40 np0005592985.novalocal kernel: openvswitch: Open vSwitch switching datapath Jan 22 22:15:40 np0005592985.novalocal ovs-ctl[69999]: Inserting openvswitch module [ OK ] Jan 22 22:15:40 np0005592985.novalocal ovs-ctl[69968]: Starting ovs-vswitchd [ OK ] Jan 22 22:15:40 np0005592985.novalocal ovs-vsctl[70015]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005592985 Jan 22 22:15:40 np0005592985.novalocal ovs-ctl[69968]: Enabling remote OVSDB managers [ OK ] Jan 22 22:15:40 np0005592985.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Jan 22 22:15:40 np0005592985.novalocal systemd[1]: Starting Open vSwitch... Jan 22 22:15:40 np0005592985.novalocal systemd[1]: Finished Open vSwitch. Jan 22 22:15:40 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:15:40 np0005592985.novalocal systemd-rc-local-generator[70037]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:15:40 np0005592985.novalocal systemd-sysv-generator[70042]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:15:41 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:15:41 np0005592985.novalocal systemd-rc-local-generator[70066]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:15:41 np0005592985.novalocal systemd-sysv-generator[70071]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:15:46 np0005592985.novalocal dnf[68675]: Metadata cache created. Jan 22 22:15:46 np0005592985.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Jan 22 22:15:46 np0005592985.novalocal systemd[1]: Finished dnf makecache. Jan 22 22:15:46 np0005592985.novalocal systemd[1]: dnf-makecache.service: Consumed 9.387s CPU time. Jan 22 22:15:48 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:15:48 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:15:48 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:15:48 np0005592985.novalocal systemd-rc-local-generator[70128]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:15:48 np0005592985.novalocal systemd-sysv-generator[70132]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:15:49 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:15:49 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:15:49 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:15:49 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.003s CPU time. Jan 22 22:15:49 np0005592985.novalocal systemd[1]: run-r57280cae44144f29a01526ae7134080b.service: Deactivated successfully. Jan 22 22:15:52 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:15:52 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:15:52 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:15:52 np0005592985.novalocal systemd-rc-local-generator[70551]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:15:52 np0005592985.novalocal systemd-sysv-generator[70556]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:15:52 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:15:52 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:15:52 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:15:52 np0005592985.novalocal systemd[1]: run-r6a209273c55f4aee863e3aae1eeefa8b.service: Deactivated successfully. Jan 22 22:15:53 np0005592985.novalocal ovs-vsctl[70626]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Jan 22 22:15:53 np0005592985.novalocal ovs-vsctl[70629]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Jan 22 22:15:53 np0005592985.novalocal ovs-vsctl[70631]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70634]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005592985.novalocal Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70636]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70638]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70640]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70642]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70644]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70646]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70650]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Jan 22 22:15:54 np0005592985.novalocal ovs-vsctl[70654]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Jan 22 22:16:05 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:16:05 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:16:05 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:16:05 np0005592985.novalocal groupadd[70675]: group added to /etc/group: name=keystone, GID=163 Jan 22 22:16:05 np0005592985.novalocal groupadd[70675]: group added to /etc/gshadow: name=keystone Jan 22 22:16:05 np0005592985.novalocal groupadd[70675]: new group: name=keystone, GID=163 Jan 22 22:16:05 np0005592985.novalocal useradd[70682]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Jan 22 22:16:05 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:16:05 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:16:07 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:16:07 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:16:07 np0005592985.novalocal systemd[1]: run-rf49d510420554c6bb6ec027d53fd4f56.service: Deactivated successfully. Jan 22 22:16:12 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:16:12 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:16:13 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:16:13 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:16:13 np0005592985.novalocal systemd[1]: run-r3dfdcc159fde456989186a6bec7f557e.service: Deactivated successfully. Jan 22 22:16:20 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:20 np0005592985.novalocal systemd-rc-local-generator[71335]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:20 np0005592985.novalocal systemd-sysv-generator[71341]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:20 np0005592985.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Jan 22 22:16:20 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:20 np0005592985.novalocal systemd-sysv-generator[71369]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:20 np0005592985.novalocal systemd-rc-local-generator[71365]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:21 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:21 np0005592985.novalocal systemd-sysv-generator[71401]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:21 np0005592985.novalocal systemd-rc-local-generator[71397]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:21 np0005592985.novalocal systemd-logind[801]: Watching system buttons on /dev/input/event0 (Power Button) Jan 22 22:16:21 np0005592985.novalocal systemd-logind[801]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 22 22:16:23 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:23 np0005592985.novalocal systemd-rc-local-generator[71496]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:23 np0005592985.novalocal systemd-sysv-generator[71499]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:23 np0005592985.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Jan 22 22:16:23 np0005592985.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Jan 22 22:16:23 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:23 np0005592985.novalocal systemd-rc-local-generator[71528]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:23 np0005592985.novalocal systemd-sysv-generator[71532]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:24 np0005592985.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Jan 22 22:16:26 np0005592985.novalocal groupadd[71543]: group added to /etc/group: name=cinder, GID=165 Jan 22 22:16:26 np0005592985.novalocal groupadd[71543]: group added to /etc/gshadow: name=cinder Jan 22 22:16:26 np0005592985.novalocal groupadd[71543]: new group: name=cinder, GID=165 Jan 22 22:16:26 np0005592985.novalocal useradd[71550]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Jan 22 22:16:26 np0005592985.novalocal useradd[71550]: add 'cinder' to group 'nobody' Jan 22 22:16:26 np0005592985.novalocal useradd[71550]: add 'cinder' to group 'cinder' Jan 22 22:16:26 np0005592985.novalocal useradd[71550]: add 'cinder' to shadow group 'nobody' Jan 22 22:16:26 np0005592985.novalocal useradd[71550]: add 'cinder' to shadow group 'cinder' Jan 22 22:16:27 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:16:27 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:16:27 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:27 np0005592985.novalocal systemd-sysv-generator[71599]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:27 np0005592985.novalocal systemd-rc-local-generator[71594]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:27 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:16:30 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:30 np0005592985.novalocal systemd-rc-local-generator[73568]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:30 np0005592985.novalocal systemd-sysv-generator[73573]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.532s CPU time. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: run-r20a850ccff28400f8c2a443efd2064df.service: Deactivated successfully. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Jan 22 22:16:30 np0005592985.novalocal systemd[1]: Starting Open-iSCSI... Jan 22 22:16:30 np0005592985.novalocal kernel: Loading iSCSI transport class v2.0-870. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: Started Open-iSCSI. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Jan 22 22:16:30 np0005592985.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:30 np0005592985.novalocal systemd-sysv-generator[73613]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:30 np0005592985.novalocal systemd-rc-local-generator[73608]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:30 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:30 np0005592985.novalocal systemd-rc-local-generator[73639]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:30 np0005592985.novalocal systemd-sysv-generator[73642]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:33 np0005592985.novalocal groupadd[73658]: group added to /etc/group: name=glance, GID=161 Jan 22 22:16:33 np0005592985.novalocal groupadd[73658]: group added to /etc/gshadow: name=glance Jan 22 22:16:33 np0005592985.novalocal groupadd[73658]: new group: name=glance, GID=161 Jan 22 22:16:33 np0005592985.novalocal useradd[73665]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Jan 22 22:16:33 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:34 np0005592985.novalocal systemd-rc-local-generator[73696]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:34 np0005592985.novalocal systemd-sysv-generator[73700]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:34 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:16:36 np0005592985.novalocal kernel: SELinux: Converting 2770 SID table entries... Jan 22 22:16:36 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:16:36 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:16:36 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:16:36 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:16:36 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:16:36 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:16:36 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:16:37 np0005592985.novalocal setsebool[73713]: The os_neutron_dac_override policy boolean was changed to on by root Jan 22 22:16:37 np0005592985.novalocal ovs-vsctl[73720]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.2566] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Jan 22 22:16:37 np0005592985.novalocal kernel: ovs-system: entered promiscuous mode Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.2586] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Jan 22 22:16:37 np0005592985.novalocal kernel: Timeout policy base is empty Jan 22 22:16:37 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=12 res=1 Jan 22 22:16:37 np0005592985.novalocal kernel: br-ex: entered promiscuous mode Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.3102] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.3120] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Jan 22 22:16:37 np0005592985.novalocal systemd-udevd[73736]: Network interface NamePolicy= disabled on kernel command line. Jan 22 22:16:37 np0005592985.novalocal systemd-udevd[73738]: Network interface NamePolicy= disabled on kernel command line. Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.3708] device (br-ex): carrier: link connected Jan 22 22:16:37 np0005592985.novalocal systemd-udevd[73737]: Network interface NamePolicy= disabled on kernel command line. Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.4170] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.6489] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73757 uid=0 result="success" Jan 22 22:16:37 np0005592985.novalocal ifdown[73758]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Jan 22 22:16:37 np0005592985.novalocal ifdown[73759]: 'network-scripts' will be removed from distribution in near future. Jan 22 22:16:37 np0005592985.novalocal ifdown[73760]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.6946] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73766 uid=0 result="success" Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.7445] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73774 uid=0 result="success" Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.7804] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73783 uid=0 result="success" Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.8765] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73806 uid=0 result="success" Jan 22 22:16:37 np0005592985.novalocal ovs-vsctl[73811]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Jan 22 22:16:37 np0005592985.novalocal kernel: br-ex: left promiscuous mode Jan 22 22:16:37 np0005592985.novalocal kernel: ovs-system: left promiscuous mode Jan 22 22:16:37 np0005592985.novalocal NetworkManager[858]: [1769138197.9893] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73829 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ifdown[73833]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Jan 22 22:16:38 np0005592985.novalocal ifdown[73834]: 'network-scripts' will be removed from distribution in near future. Jan 22 22:16:38 np0005592985.novalocal ifdown[73835]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.0417] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73841 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.0942] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73852 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.1352] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73864 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.2363] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73890 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ovs-vsctl[73898]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.3249] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73905 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ifup[73909]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 22 22:16:38 np0005592985.novalocal ifup[73910]: 'network-scripts' will be removed from distribution in near future. Jan 22 22:16:38 np0005592985.novalocal ifup[73911]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.3789] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73917 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.4840] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73929 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ifup[73930]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 22 22:16:38 np0005592985.novalocal ifup[73931]: 'network-scripts' will be removed from distribution in near future. Jan 22 22:16:38 np0005592985.novalocal ifup[73932]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.5276] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=73938 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ovs-vsctl[73940]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Jan 22 22:16:38 np0005592985.novalocal kernel: ovs-system: entered promiscuous mode Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.5612] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.5626] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Jan 22 22:16:38 np0005592985.novalocal kernel: No such timeout policy "ovs_test_tp" Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.5706] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Jan 22 22:16:38 np0005592985.novalocal kernel: br-ex: entered promiscuous mode Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.5718] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.6083] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73961 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.6560] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73972 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.7294] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=73990 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ovs-vsctl[74010]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.8005] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Jan 22 22:16:38 np0005592985.novalocal kernel: loop1: entered promiscuous mode Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.8021] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.8337] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74017 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ifup[74018]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 22 22:16:38 np0005592985.novalocal ifup[74019]: 'network-scripts' will be removed from distribution in near future. Jan 22 22:16:38 np0005592985.novalocal ifup[74020]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.8807] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74026 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ovs-vsctl[74030]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Jan 22 22:16:38 np0005592985.novalocal NetworkManager[858]: [1769138198.9719] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74037 uid=0 result="success" Jan 22 22:16:38 np0005592985.novalocal ifup[74038]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 22 22:16:38 np0005592985.novalocal ifup[74039]: 'network-scripts' will be removed from distribution in near future. Jan 22 22:16:38 np0005592985.novalocal ifup[74040]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 22 22:16:39 np0005592985.novalocal NetworkManager[858]: [1769138199.0168] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74046 uid=0 result="success" Jan 22 22:16:39 np0005592985.novalocal ovs-vsctl[74050]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Jan 22 22:16:39 np0005592985.novalocal NetworkManager[858]: [1769138199.0931] device (br-ex): carrier: link connected Jan 22 22:16:44 np0005592985.novalocal groupadd[74078]: group added to /etc/group: name=radvd, GID=75 Jan 22 22:16:44 np0005592985.novalocal groupadd[74078]: group added to /etc/gshadow: name=radvd Jan 22 22:16:44 np0005592985.novalocal groupadd[74078]: new group: name=radvd, GID=75 Jan 22 22:16:44 np0005592985.novalocal useradd[74087]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Jan 22 22:16:44 np0005592985.novalocal groupadd[74102]: group added to /etc/group: name=haproxy, GID=982 Jan 22 22:16:44 np0005592985.novalocal groupadd[74102]: group added to /etc/gshadow: name=haproxy Jan 22 22:16:44 np0005592985.novalocal groupadd[74102]: new group: name=haproxy, GID=982 Jan 22 22:16:44 np0005592985.novalocal useradd[74109]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Jan 22 22:16:45 np0005592985.novalocal groupadd[74121]: group added to /etc/group: name=dnsmasq, GID=981 Jan 22 22:16:45 np0005592985.novalocal groupadd[74121]: group added to /etc/gshadow: name=dnsmasq Jan 22 22:16:45 np0005592985.novalocal groupadd[74121]: new group: name=dnsmasq, GID=981 Jan 22 22:16:45 np0005592985.novalocal useradd[74128]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Jan 22 22:16:45 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:16:45 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:16:47 np0005592985.novalocal groupadd[74140]: group added to /etc/group: name=neutron, GID=980 Jan 22 22:16:47 np0005592985.novalocal groupadd[74140]: group added to /etc/gshadow: name=neutron Jan 22 22:16:47 np0005592985.novalocal groupadd[74140]: new group: name=neutron, GID=980 Jan 22 22:16:47 np0005592985.novalocal useradd[74147]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Jan 22 22:16:48 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:16:48 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:16:48 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:48 np0005592985.novalocal systemd-sysv-generator[74206]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:48 np0005592985.novalocal systemd-rc-local-generator[74202]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:49 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:16:49 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:16:49 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:16:49 np0005592985.novalocal systemd[1]: run-rb70162a3123b47929961c791f85bfe8f.service: Deactivated successfully. Jan 22 22:16:53 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:54 np0005592985.novalocal systemd-sysv-generator[74959]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:54 np0005592985.novalocal systemd-rc-local-generator[74956]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:54 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:16:55 np0005592985.novalocal ovs-vsctl[74969]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Jan 22 22:16:57 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:16:57 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:16:57 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:16:57 np0005592985.novalocal systemd-rc-local-generator[75013]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:16:57 np0005592985.novalocal systemd-sysv-generator[75016]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:16:58 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:16:58 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:16:58 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:16:58 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.149s CPU time. Jan 22 22:16:58 np0005592985.novalocal systemd[1]: run-r6e4bacb46a0248ad9bd37ee1359d3ae4.service: Deactivated successfully. Jan 22 22:17:00 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:17:00 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:17:00 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:17:00 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:17:00 np0005592985.novalocal systemd-rc-local-generator[75436]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:17:00 np0005592985.novalocal systemd-sysv-generator[75441]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:17:00 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:17:07 np0005592985.novalocal groupadd[75465]: group added to /etc/group: name=placement, GID=979 Jan 22 22:17:07 np0005592985.novalocal groupadd[75465]: group added to /etc/gshadow: name=placement Jan 22 22:17:07 np0005592985.novalocal groupadd[75465]: new group: name=placement, GID=979 Jan 22 22:17:07 np0005592985.novalocal useradd[75472]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Jan 22 22:17:13 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:17:13 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:17:14 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:17:14 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:17:14 np0005592985.novalocal systemd[1]: run-r43f6f04c277f428898f6c87e32b8ae32.service: Deactivated successfully. Jan 22 22:17:16 np0005592985.novalocal groupadd[75643]: group added to /etc/group: name=nova, GID=162 Jan 22 22:17:16 np0005592985.novalocal groupadd[75643]: group added to /etc/gshadow: name=nova Jan 22 22:17:16 np0005592985.novalocal groupadd[75643]: new group: name=nova, GID=162 Jan 22 22:17:16 np0005592985.novalocal useradd[75650]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Jan 22 22:17:16 np0005592985.novalocal useradd[75650]: add 'nova' to group 'nobody' Jan 22 22:17:16 np0005592985.novalocal useradd[75650]: add 'nova' to group 'nova' Jan 22 22:17:16 np0005592985.novalocal useradd[75650]: add 'nova' to shadow group 'nobody' Jan 22 22:17:16 np0005592985.novalocal useradd[75650]: add 'nova' to shadow group 'nova' Jan 22 22:17:34 np0005592985.novalocal kernel: SELinux: Converting 2777 SID table entries... Jan 22 22:17:34 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:17:34 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:17:34 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:17:34 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:17:34 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:17:34 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:17:34 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:17:43 np0005592985.novalocal kernel: SELinux: Converting 2777 SID table entries... Jan 22 22:17:43 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:17:43 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:17:43 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:17:43 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:17:43 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:17:43 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:17:43 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:17:52 np0005592985.novalocal kernel: SELinux: Converting 2777 SID table entries... Jan 22 22:17:52 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:17:52 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:17:52 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:17:52 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:17:52 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:17:52 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:17:52 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:18:03 np0005592985.novalocal kernel: SELinux: Converting 2781 SID table entries... Jan 22 22:18:03 np0005592985.novalocal kernel: SELinux: policy capability network_peer_controls=1 Jan 22 22:18:03 np0005592985.novalocal kernel: SELinux: policy capability open_perms=1 Jan 22 22:18:03 np0005592985.novalocal kernel: SELinux: policy capability extended_socket_class=1 Jan 22 22:18:03 np0005592985.novalocal kernel: SELinux: policy capability always_check_network=0 Jan 22 22:18:03 np0005592985.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 22:18:03 np0005592985.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 22:18:03 np0005592985.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 22 22:18:03 np0005592985.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=16 res=1 Jan 22 22:18:03 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:18:03 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:18:03 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:18:03 np0005592985.novalocal groupadd[75799]: group added to /etc/group: name=qemu, GID=107 Jan 22 22:18:03 np0005592985.novalocal groupadd[75799]: group added to /etc/gshadow: name=qemu Jan 22 22:18:03 np0005592985.novalocal groupadd[75799]: new group: name=qemu, GID=107 Jan 22 22:18:03 np0005592985.novalocal useradd[75806]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Jan 22 22:18:03 np0005592985.novalocal useradd[75806]: add 'qemu' to group 'kvm' Jan 22 22:18:03 np0005592985.novalocal useradd[75806]: add 'qemu' to shadow group 'kvm' Jan 22 22:18:04 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:18:04 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:18:04 np0005592985.novalocal dbus-broker-launch[770]: Noticed file-system modification, trigger reload. Jan 22 22:18:04 np0005592985.novalocal groupadd[75844]: group added to /etc/group: name=libvirt, GID=978 Jan 22 22:18:04 np0005592985.novalocal groupadd[75844]: group added to /etc/gshadow: name=libvirt Jan 22 22:18:04 np0005592985.novalocal groupadd[75844]: new group: name=libvirt, GID=978 Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Reloading rules Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Collecting garbage unconditionally... Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Finished loading, compiling and executing 5 rules Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Reloading rules Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Collecting garbage unconditionally... Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Loading rules from directory /etc/polkit-1/rules.d Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 22 22:18:04 np0005592985.novalocal polkitd[10003]: Finished loading, compiling and executing 5 rules Jan 22 22:18:09 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:18:09 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:18:09 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:09 np0005592985.novalocal systemd-rc-local-generator[76557]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:09 np0005592985.novalocal systemd-sysv-generator[76561]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:09 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:18:14 np0005592985.novalocal groupadd[79045]: group added to /etc/group: name=octavia, GID=977 Jan 22 22:18:14 np0005592985.novalocal groupadd[79045]: group added to /etc/gshadow: name=octavia Jan 22 22:18:14 np0005592985.novalocal groupadd[79045]: new group: name=octavia, GID=977 Jan 22 22:18:14 np0005592985.novalocal useradd[79091]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Jan 22 22:18:15 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:18:15 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:18:15 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.128s CPU time. Jan 22 22:18:15 np0005592985.novalocal systemd[1]: run-r64bea1b832874dbdb5f866db70135230.service: Deactivated successfully. Jan 22 22:18:19 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:19 np0005592985.novalocal systemd-sysv-generator[80023]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:19 np0005592985.novalocal systemd-rc-local-generator[80020]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:19 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:18:24 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:24 np0005592985.novalocal systemd-sysv-generator[80070]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:24 np0005592985.novalocal systemd-rc-local-generator[80066]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:24 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:18:26 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:27 np0005592985.novalocal systemd-rc-local-generator[80107]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:27 np0005592985.novalocal systemd-sysv-generator[80110]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:27 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:18:29 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:29 np0005592985.novalocal systemd-rc-local-generator[80146]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:29 np0005592985.novalocal systemd-sysv-generator[80150]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:29 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:18:31 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:32 np0005592985.novalocal systemd-rc-local-generator[80187]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:32 np0005592985.novalocal systemd-sysv-generator[80190]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:32 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:18:42 np0005592985.novalocal groupadd[80218]: group added to /etc/group: name=apache, GID=48 Jan 22 22:18:42 np0005592985.novalocal groupadd[80218]: group added to /etc/gshadow: name=apache Jan 22 22:18:42 np0005592985.novalocal groupadd[80218]: new group: name=apache, GID=48 Jan 22 22:18:42 np0005592985.novalocal useradd[80227]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Jan 22 22:18:47 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:47 np0005592985.novalocal systemd-sysv-generator[80263]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:47 np0005592985.novalocal systemd-rc-local-generator[80259]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:48 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:18:48 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:18:48 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:49 np0005592985.novalocal systemd-sysv-generator[80355]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:49 np0005592985.novalocal systemd-rc-local-generator[80349]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:49 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:18:50 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:18:50 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:18:50 np0005592985.novalocal systemd[1]: run-r204acf51c6b2430b965cc174cffea71b.service: Deactivated successfully. Jan 22 22:18:56 np0005592985.novalocal groupadd[80677]: group added to /etc/group: name=manila, GID=976 Jan 22 22:18:56 np0005592985.novalocal groupadd[80677]: group added to /etc/gshadow: name=manila Jan 22 22:18:56 np0005592985.novalocal groupadd[80677]: new group: name=manila, GID=976 Jan 22 22:18:56 np0005592985.novalocal useradd[80684]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Jan 22 22:18:56 np0005592985.novalocal useradd[80684]: add 'manila' to group 'nobody' Jan 22 22:18:56 np0005592985.novalocal useradd[80684]: add 'manila' to group 'manila' Jan 22 22:18:56 np0005592985.novalocal useradd[80684]: add 'manila' to shadow group 'nobody' Jan 22 22:18:56 np0005592985.novalocal useradd[80684]: add 'manila' to shadow group 'manila' Jan 22 22:18:57 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:18:57 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:18:57 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:18:57 np0005592985.novalocal systemd-rc-local-generator[80727]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:18:58 np0005592985.novalocal systemd-sysv-generator[80730]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:18:58 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:18:58 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:18:58 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:18:58 np0005592985.novalocal systemd[1]: run-r9272b5dc5bd44922ba02308e18028250.service: Deactivated successfully. Jan 22 22:19:01 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:19:01 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:19:01 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:19:01 np0005592985.novalocal groupadd[80905]: group added to /etc/group: name=printadmin, GID=975 Jan 22 22:19:01 np0005592985.novalocal groupadd[80905]: group added to /etc/gshadow: name=printadmin Jan 22 22:19:01 np0005592985.novalocal groupadd[80905]: new group: name=printadmin, GID=975 Jan 22 22:19:02 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:19:02 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:19:02 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:03 np0005592985.novalocal systemd-rc-local-generator[80953]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:03 np0005592985.novalocal systemd-sysv-generator[80959]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:03 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:19:04 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:19:04 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:19:04 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.275s CPU time. Jan 22 22:19:04 np0005592985.novalocal systemd[1]: run-r0b40914657f4448390e5a7b3a73b0078.service: Deactivated successfully. Jan 22 22:19:04 np0005592985.novalocal kernel: loop: module loaded Jan 22 22:19:04 np0005592985.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Jan 22 22:19:05 np0005592985.novalocal lvm[81531]: PV /dev/loop3 not used. Jan 22 22:19:05 np0005592985.novalocal lvm[81534]: PV /dev/loop3 online, VG lvm-shares is complete. Jan 22 22:19:05 np0005592985.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Jan 22 22:19:05 np0005592985.novalocal lvm[81536]: 0 logical volume(s) in volume group "lvm-shares" now active Jan 22 22:19:05 np0005592985.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Jan 22 22:19:20 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:19:20 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:19:21 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:19:21 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:19:21 np0005592985.novalocal systemd[1]: run-r4b9b9654d99f4342851fa458540b8358.service: Deactivated successfully. Jan 22 22:19:28 np0005592985.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Jan 22 22:19:28 np0005592985.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Jan 22 22:19:28 np0005592985.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Jan 22 22:19:28 np0005592985.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Jan 22 22:19:29 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:29 np0005592985.novalocal systemd-sysv-generator[81840]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:29 np0005592985.novalocal systemd-rc-local-generator[81837]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:29 np0005592985.novalocal systemd[1]: Starting MariaDB 10.5 database server... Jan 22 22:19:29 np0005592985.novalocal mariadb-prepare-db-dir[81868]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Jan 22 22:19:29 np0005592985.novalocal mariadb-prepare-db-dir[81868]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Jan 22 22:19:29 np0005592985.novalocal systemd[1]: Started MariaDB 10.5 database server. Jan 22 22:19:29 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:29 np0005592985.novalocal systemd-rc-local-generator[81982]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:29 np0005592985.novalocal systemd-sysv-generator[81985]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:30 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:30 np0005592985.novalocal systemd-sysv-generator[82013]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:30 np0005592985.novalocal systemd-rc-local-generator[82008]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:30 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:30 np0005592985.novalocal systemd-rc-local-generator[82047]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:30 np0005592985.novalocal systemd-sysv-generator[82051]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:31 np0005592985.novalocal systemd[1]: Starting Redis persistent key-value database... Jan 22 22:19:31 np0005592985.novalocal systemd[1]: Started Redis persistent key-value database. Jan 22 22:19:31 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:31 np0005592985.novalocal systemd-rc-local-generator[82082]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:31 np0005592985.novalocal systemd-sysv-generator[82086]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:31 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:31 np0005592985.novalocal systemd-sysv-generator[82113]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:31 np0005592985.novalocal systemd-rc-local-generator[82108]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:31 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:32 np0005592985.novalocal systemd-sysv-generator[82146]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:32 np0005592985.novalocal systemd-rc-local-generator[82142]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:32 np0005592985.novalocal systemd[1]: Starting Redis Sentinel... Jan 22 22:19:32 np0005592985.novalocal systemd[1]: Started Redis Sentinel. Jan 22 22:19:32 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:32 np0005592985.novalocal systemd-rc-local-generator[82178]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:32 np0005592985.novalocal systemd-sysv-generator[82182]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:32 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:32 np0005592985.novalocal systemd-rc-local-generator[82207]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:32 np0005592985.novalocal systemd-sysv-generator[82210]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:33 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:33 np0005592985.novalocal systemd-rc-local-generator[82288]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:33 np0005592985.novalocal systemd-sysv-generator[82291]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:34 np0005592985.novalocal systemd[1]: Starting OVN northd management daemon... Jan 22 22:19:34 np0005592985.novalocal chown[82297]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Jan 22 22:19:34 np0005592985.novalocal ovn-ctl[82298]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Jan 22 22:19:34 np0005592985.novalocal ovn-ctl[82298]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Jan 22 22:19:34 np0005592985.novalocal ovsdb-server[82400]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Jan 22 22:19:34 np0005592985.novalocal ovsdb-server[82402]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Jan 22 22:19:34 np0005592985.novalocal ovsdb-server[82401]: ovs|00002|vlog(monitor)|INFO|closing log file Jan 22 22:19:34 np0005592985.novalocal ovsdb-server[82401]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Jan 22 22:19:34 np0005592985.novalocal ovn-ctl[82298]: Starting ovsdb-nb [ OK ] Jan 22 22:19:34 np0005592985.novalocal ovn-nbctl[82406]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Jan 22 22:19:34 np0005592985.novalocal ovn-ctl[82298]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Jan 22 22:19:34 np0005592985.novalocal ovn-ctl[82298]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Jan 22 22:19:34 np0005592985.novalocal ovsdb-server[82426]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Jan 22 22:19:34 np0005592985.novalocal ovsdb-server[82428]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Jan 22 22:19:34 np0005592985.novalocal ovsdb-server[82427]: ovs|00002|vlog(monitor)|INFO|closing log file Jan 22 22:19:34 np0005592985.novalocal ovsdb-server[82427]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Jan 22 22:19:34 np0005592985.novalocal ovn-ctl[82298]: Starting ovsdb-sb [ OK ] Jan 22 22:19:34 np0005592985.novalocal ovn-sbctl[82432]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Jan 22 22:19:34 np0005592985.novalocal ovn-ctl[82298]: Starting ovn-northd [ OK ] Jan 22 22:19:34 np0005592985.novalocal systemd[1]: Finished OVN northd management daemon. Jan 22 22:19:34 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:35 np0005592985.novalocal systemd-rc-local-generator[82470]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:35 np0005592985.novalocal systemd-sysv-generator[82473]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:35 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:35 np0005592985.novalocal systemd-rc-local-generator[82495]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:35 np0005592985.novalocal systemd-sysv-generator[82498]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:35 np0005592985.novalocal ovn-nbctl[82510]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Jan 22 22:19:35 np0005592985.novalocal ovn-sbctl[82514]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Jan 22 22:19:35 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:19:36 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:19:36 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:19:36 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:36 np0005592985.novalocal systemd-sysv-generator[82566]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:36 np0005592985.novalocal systemd-rc-local-generator[82561]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:36 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:19:36 np0005592985.novalocal systemd[1]: Starting OVN controller daemon... Jan 22 22:19:36 np0005592985.novalocal ovn-ctl[82572]: Starting ovn-controller [ OK ] Jan 22 22:19:36 np0005592985.novalocal systemd[1]: Started OVN controller daemon. Jan 22 22:19:36 np0005592985.novalocal kernel: br-int: entered promiscuous mode Jan 22 22:19:36 np0005592985.novalocal NetworkManager[858]: [1769138376.5946] manager: (br-int): 'openvswitch' plugin not available; creating generic device Jan 22 22:19:36 np0005592985.novalocal NetworkManager[858]: [1769138376.5972] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Jan 22 22:19:36 np0005592985.novalocal systemd-udevd[82628]: Network interface NamePolicy= disabled on kernel command line. Jan 22 22:19:36 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:36 np0005592985.novalocal systemd-sysv-generator[82655]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:36 np0005592985.novalocal systemd-rc-local-generator[82652]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:36 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:19:37 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:37 np0005592985.novalocal systemd-rc-local-generator[82680]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:37 np0005592985.novalocal systemd-sysv-generator[82684]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:37 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:19:39 np0005592985.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Jan 22 22:19:40 np0005592985.novalocal lvm[82702]: PV /dev/loop2 not used. Jan 22 22:19:40 np0005592985.novalocal lvm[82705]: PV /dev/loop2 online, VG cinder-volumes is complete. Jan 22 22:19:40 np0005592985.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Jan 22 22:19:40 np0005592985.novalocal lvm[82707]: 0 logical volume(s) in volume group "cinder-volumes" now active Jan 22 22:19:40 np0005592985.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Jan 22 22:19:44 np0005592985.novalocal ovsdb-server[82402]: ovs|00003|memory|INFO|10248 kB peak resident set size after 10.2 seconds Jan 22 22:19:44 np0005592985.novalocal ovsdb-server[82402]: ovs|00004|memory|INFO|atoms:43 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Jan 22 22:19:44 np0005592985.novalocal ovsdb-server[82428]: ovs|00003|memory|INFO|11120 kB peak resident set size after 10.0 seconds Jan 22 22:19:44 np0005592985.novalocal ovsdb-server[82428]: ovs|00004|memory|INFO|atoms:447 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Jan 22 22:19:50 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:50 np0005592985.novalocal systemd-rc-local-generator[82744]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:50 np0005592985.novalocal systemd-sysv-generator[82748]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:50 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:19:50 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:19:53 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:19:53 np0005592985.novalocal systemd-sysv-generator[82786]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:19:53 np0005592985.novalocal systemd-rc-local-generator[82781]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:19:53 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:19:53 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:19:58 np0005592985.novalocal groupadd[82854]: group added to /etc/group: name=clevis, GID=974 Jan 22 22:19:58 np0005592985.novalocal groupadd[82854]: group added to /etc/gshadow: name=clevis Jan 22 22:19:58 np0005592985.novalocal groupadd[82854]: new group: name=clevis, GID=974 Jan 22 22:19:58 np0005592985.novalocal useradd[82861]: new user: name=clevis, UID=977, GID=974, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Jan 22 22:19:58 np0005592985.novalocal usermod[82871]: add 'clevis' to group 'tss' Jan 22 22:19:58 np0005592985.novalocal usermod[82871]: add 'clevis' to shadow group 'tss' Jan 22 22:19:58 np0005592985.novalocal usermod[82887]: add 'nova' to group 'qemu' Jan 22 22:19:58 np0005592985.novalocal usermod[82887]: add 'nova' to shadow group 'qemu' Jan 22 22:19:58 np0005592985.novalocal usermod[82894]: add 'nova' to group 'libvirt' Jan 22 22:19:58 np0005592985.novalocal usermod[82894]: add 'nova' to shadow group 'libvirt' Jan 22 22:19:59 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:20:00 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:20:00 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:20:00 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:20:00 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:20:00 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:20:00 np0005592985.novalocal systemd-rc-local-generator[82974]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:20:00 np0005592985.novalocal systemd-sysv-generator[82977]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:20:00 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:20:00 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:20:03 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:20:03 np0005592985.novalocal systemd-rc-local-generator[84965]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:20:03 np0005592985.novalocal systemd-sysv-generator[84971]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:20:03 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:20:03 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:20:05 np0005592985.novalocal sshd-session[86104]: Received disconnect from 45.148.10.152 port 60896:11: [preauth] Jan 22 22:20:05 np0005592985.novalocal sshd-session[86104]: Disconnected from authenticating user root 45.148.10.152 port 60896 [preauth] Jan 22 22:20:05 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:20:05 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:20:05 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.218s CPU time. Jan 22 22:20:05 np0005592985.novalocal systemd[1]: run-r4bf8e40483fc4408bc4e75dc6cd2aab6.service: Deactivated successfully. Jan 22 22:20:06 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:20:06 np0005592985.novalocal systemd-rc-local-generator[86880]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:20:06 np0005592985.novalocal systemd-sysv-generator[86883]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:20:06 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:20:06 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:20:08 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:20:09 np0005592985.novalocal systemd-rc-local-generator[86910]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:20:09 np0005592985.novalocal systemd-sysv-generator[86914]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:20:09 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:20:30 np0005592985.novalocal crontab[86960]: (root) LIST (root) Jan 22 22:20:30 np0005592985.novalocal crontab[86961]: (root) LIST (keystone) Jan 22 22:20:31 np0005592985.novalocal crontab[86962]: (root) LIST (cinder) Jan 22 22:20:31 np0005592985.novalocal crontab[86963]: (root) LIST (glance) Jan 22 22:20:31 np0005592985.novalocal crontab[86964]: (root) LIST (nova) Jan 22 22:20:31 np0005592985.novalocal crontab[86965]: (root) LIST (manila) Jan 22 22:20:31 np0005592985.novalocal crontab[86966]: (root) REPLACE (cinder) Jan 22 22:20:31 np0005592985.novalocal crontab[86967]: (root) REPLACE (glance) Jan 22 22:20:31 np0005592985.novalocal crontab[86968]: (root) REPLACE (glance) Jan 22 22:20:37 np0005592985.novalocal crontab[86980]: (root) REPLACE (glance) Jan 22 22:21:01 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:21:01 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:21:01 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:21:11 np0005592985.novalocal crontab[87027]: (root) REPLACE (nova) Jan 22 22:21:18 np0005592985.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 22 22:21:18 np0005592985.novalocal systemd[1]: Starting man-db-cache-update.service... Jan 22 22:21:18 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:19 np0005592985.novalocal systemd-rc-local-generator[87074]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:19 np0005592985.novalocal systemd-sysv-generator[87079]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:19 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:19 np0005592985.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Jan 22 22:21:19 np0005592985.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 22 22:21:19 np0005592985.novalocal systemd[1]: Finished man-db-cache-update.service. Jan 22 22:21:19 np0005592985.novalocal systemd[1]: run-r2243adcc34da4a75ba18cfd85b471c22.service: Deactivated successfully. Jan 22 22:21:28 np0005592985.novalocal crontab[87173]: (root) REPLACE (manila) Jan 22 22:21:28 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:28 np0005592985.novalocal systemd-sysv-generator[87198]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:28 np0005592985.novalocal systemd-rc-local-generator[87192]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:28 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:28 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:29 np0005592985.novalocal systemd-rc-local-generator[87226]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:29 np0005592985.novalocal systemd-sysv-generator[87231]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:29 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:29 np0005592985.novalocal systemd[87236]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Jan 22 22:21:29 np0005592985.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Jan 22 22:21:29 np0005592985.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Jan 22 22:21:29 np0005592985.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Jan 22 22:21:29 np0005592985.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Jan 22 22:21:29 np0005592985.novalocal systemd[1]: Starting RabbitMQ broker... Jan 22 22:21:29 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:29.818992-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Jan 22 22:21:29 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:29.828345-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Jan 22 22:21:29 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:29.828374-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.361239-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.361301-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.361322-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.361350-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.361429-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.361447-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.361465-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.361506-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.619544-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: 2026-01-22 22:21:31.619642-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: ## ## RabbitMQ 3.9.21 Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: ## ## Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: ###### ## Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: Erlang: 24.3.4.2 [jit] Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: Doc guides: https://rabbitmq.com/documentation.html Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: Support: https://rabbitmq.com/contact.html Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: Tutorials: https://rabbitmq.com/getstarted.html Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: Monitoring: https://rabbitmq.com/monitoring.html Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: Jan 22 22:21:31 np0005592985.novalocal rabbitmq-server[87237]: Config file(s): /etc/rabbitmq/rabbitmq.config Jan 22 22:21:34 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:21:34 np0005592985.novalocal rabbitmq-server[87237]: Starting broker... completed with 3 plugins. Jan 22 22:21:34 np0005592985.novalocal systemd[1]: Started RabbitMQ broker. Jan 22 22:21:34 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:35 np0005592985.novalocal systemd-rc-local-generator[87340]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:35 np0005592985.novalocal systemd-sysv-generator[87347]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:35 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:35 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:21:35 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:35 np0005592985.novalocal systemd-rc-local-generator[87372]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:35 np0005592985.novalocal systemd-sysv-generator[87375]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:35 np0005592985.novalocal setroubleshoot[87320]: failed to retrieve rpm info for path '/proc/net/if_inet6': Jan 22 22:21:35 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:35 np0005592985.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Jan 22 22:21:35 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Jan 22 22:21:35 np0005592985.novalocal runuser[87390]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:36 np0005592985.novalocal runuser[87390]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:36 np0005592985.novalocal runuser[87446]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:36 np0005592985.novalocal setroubleshoot[87320]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l e1d1740f-53f1-4222-8c10-0396125b9600 Jan 22 22:21:36 np0005592985.novalocal setroubleshoot[87320]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Jan 22 22:21:36 np0005592985.novalocal runuser[87446]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:37 np0005592985.novalocal runuser[87499]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:37 np0005592985.novalocal runuser[87499]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:37 np0005592985.novalocal runuser[87553]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:38 np0005592985.novalocal runuser[87553]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:38 np0005592985.novalocal runuser[87607]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:39 np0005592985.novalocal runuser[87607]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:39 np0005592985.novalocal runuser[87659]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:40 np0005592985.novalocal runuser[87659]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:40 np0005592985.novalocal runuser[87711]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:40 np0005592985.novalocal runuser[87711]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:41 np0005592985.novalocal runuser[87763]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:41 np0005592985.novalocal runuser[87763]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:41 np0005592985.novalocal runuser[87815]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:42 np0005592985.novalocal runuser[87815]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:42 np0005592985.novalocal runuser[87869]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:43 np0005592985.novalocal runuser[87869]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:43 np0005592985.novalocal runuser[87921]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:43 np0005592985.novalocal runuser[87921]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:44 np0005592985.novalocal runuser[87975]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:44 np0005592985.novalocal runuser[87975]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:44 np0005592985.novalocal runuser[88027]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:45 np0005592985.novalocal runuser[88027]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:45 np0005592985.novalocal runuser[88079]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:46 np0005592985.novalocal runuser[88079]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:46 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Jan 22 22:21:46 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.120s CPU time. Jan 22 22:21:46 np0005592985.novalocal runuser[88131]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:46 np0005592985.novalocal runuser[88131]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:46 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:21:47 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:47 np0005592985.novalocal systemd-rc-local-generator[88210]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:47 np0005592985.novalocal systemd-sysv-generator[88213]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:47 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:47 np0005592985.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Jan 22 22:21:47 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:48 np0005592985.novalocal systemd-sysv-generator[88247]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:48 np0005592985.novalocal systemd-rc-local-generator[88241]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:48 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:48 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:48 np0005592985.novalocal systemd-sysv-generator[88274]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:48 np0005592985.novalocal systemd-rc-local-generator[88269]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:48 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:48 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:49 np0005592985.novalocal systemd-rc-local-generator[88303]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:49 np0005592985.novalocal systemd-sysv-generator[88307]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:49 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:49 np0005592985.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Jan 22 22:21:49 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:49 np0005592985.novalocal systemd-rc-local-generator[88338]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:49 np0005592985.novalocal systemd-sysv-generator[88342]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:49 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:49 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:50 np0005592985.novalocal systemd-sysv-generator[88367]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:50 np0005592985.novalocal systemd-rc-local-generator[88364]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:50 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:50 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:50 np0005592985.novalocal systemd-sysv-generator[88402]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:50 np0005592985.novalocal systemd-rc-local-generator[88398]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:50 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:50 np0005592985.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Jan 22 22:21:51 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:51 np0005592985.novalocal systemd-rc-local-generator[88431]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:51 np0005592985.novalocal systemd-sysv-generator[88436]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:51 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:51 np0005592985.novalocal sudo[88446]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Jan 22 22:21:51 np0005592985.novalocal systemd[1]: Created slice User Slice of UID 0. Jan 22 22:21:51 np0005592985.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Jan 22 22:21:51 np0005592985.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Jan 22 22:21:51 np0005592985.novalocal systemd[1]: Starting User Manager for UID 0... Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Jan 22 22:21:51 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:51 np0005592985.novalocal systemd-rc-local-generator[88476]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:51 np0005592985.novalocal systemd-sysv-generator[88479]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:51 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Queued start job for default target Main User Target. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Created slice User Application Slice. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Started Daily Cleanup of User's Temporary Directories. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Reached target Paths. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Reached target Timers. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Starting D-Bus User Message Bus Socket... Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Starting Create User's Volatile Files and Directories... Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Listening on D-Bus User Message Bus Socket. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Reached target Sockets. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Finished Create User's Volatile Files and Directories. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Reached target Basic System. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Reached target Main User Target. Jan 22 22:21:51 np0005592985.novalocal systemd[88450]: Startup finished in 209ms. Jan 22 22:21:51 np0005592985.novalocal systemd[1]: Started User Manager for UID 0. Jan 22 22:21:51 np0005592985.novalocal systemd[1]: Started Session c1 of User root. Jan 22 22:21:51 np0005592985.novalocal sudo[88446]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:52 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:52 np0005592985.novalocal sudo[88446]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:52 np0005592985.novalocal systemd-sysv-generator[88518]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:52 np0005592985.novalocal systemd-rc-local-generator[88514]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:52 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:52 np0005592985.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Jan 22 22:21:52 np0005592985.novalocal sudo[88495]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Jan 22 22:21:52 np0005592985.novalocal systemd[1]: Started Session c2 of User root. Jan 22 22:21:52 np0005592985.novalocal sudo[88495]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:52 np0005592985.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Jan 22 22:21:52 np0005592985.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Jan 22 22:21:52 np0005592985.novalocal target[88527]: No saved config file at /etc/target/saveconfig.json, ok, exiting Jan 22 22:21:52 np0005592985.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Jan 22 22:21:52 np0005592985.novalocal sudo[88495]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:52 np0005592985.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Jan 22 22:21:52 np0005592985.novalocal sudo[88537]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:21:52 np0005592985.novalocal systemd[1]: Started Session c3 of User root. Jan 22 22:21:52 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:53 np0005592985.novalocal systemd-rc-local-generator[88559]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:53 np0005592985.novalocal systemd-sysv-generator[88563]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:53 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:53 np0005592985.novalocal sudo[88537]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:53 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:21:53 np0005592985.novalocal systemd-rc-local-generator[88588]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:21:53 np0005592985.novalocal systemd-sysv-generator[88591]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:21:53 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:21:53 np0005592985.novalocal sudo[88537]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:53 np0005592985.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Jan 22 22:21:53 np0005592985.novalocal sudo[88600]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Jan 22 22:21:53 np0005592985.novalocal systemd[1]: Started Session c4 of User root. Jan 22 22:21:53 np0005592985.novalocal sudo[88600]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:53 np0005592985.novalocal runuser[88599]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:54 np0005592985.novalocal systemd[1]: Started Device-mapper event daemon. Jan 22 22:21:54 np0005592985.novalocal dmeventd[88680]: dmeventd ready for processing. Jan 22 22:21:54 np0005592985.novalocal dmeventd[88680]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Jan 22 22:21:54 np0005592985.novalocal lvm[88686]: PV /dev/loop2 online, VG cinder-volumes is complete. Jan 22 22:21:54 np0005592985.novalocal lvm[88686]: VG cinder-volumes finished Jan 22 22:21:54 np0005592985.novalocal sudo[88600]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:54 np0005592985.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Jan 22 22:21:54 np0005592985.novalocal sudo[88695]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Jan 22 22:21:54 np0005592985.novalocal runuser[88599]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:54 np0005592985.novalocal systemd[1]: Started Session c5 of User root. Jan 22 22:21:54 np0005592985.novalocal sudo[88695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:54 np0005592985.novalocal runuser[88698]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:54 np0005592985.novalocal sudo[88695]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:54 np0005592985.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Jan 22 22:21:54 np0005592985.novalocal sudo[88746]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Jan 22 22:21:54 np0005592985.novalocal systemd[1]: Started Session c6 of User root. Jan 22 22:21:54 np0005592985.novalocal sudo[88746]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:55 np0005592985.novalocal runuser[88698]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:55 np0005592985.novalocal sudo[88746]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:55 np0005592985.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Jan 22 22:21:55 np0005592985.novalocal sudo[88758]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:21:55 np0005592985.novalocal systemd[1]: Started Session c7 of User root. Jan 22 22:21:55 np0005592985.novalocal sudo[88758]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:55 np0005592985.novalocal runuser[88759]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:55 np0005592985.novalocal sudo[88758]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:55 np0005592985.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Jan 22 22:21:55 np0005592985.novalocal sudo[88807]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:21:55 np0005592985.novalocal systemd[1]: Started Session c8 of User root. Jan 22 22:21:55 np0005592985.novalocal sudo[88807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:55 np0005592985.novalocal runuser[88759]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:55 np0005592985.novalocal sudo[88807]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:55 np0005592985.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Jan 22 22:21:55 np0005592985.novalocal sudo[88818]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:21:55 np0005592985.novalocal systemd[1]: Started Session c9 of User root. Jan 22 22:21:55 np0005592985.novalocal sudo[88818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:55 np0005592985.novalocal runuser[88819]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:56 np0005592985.novalocal sudo[88818]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:56 np0005592985.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Jan 22 22:21:56 np0005592985.novalocal sudo[88867]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:21:56 np0005592985.novalocal systemd[1]: Started Session c10 of User root. Jan 22 22:21:56 np0005592985.novalocal sudo[88867]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:56 np0005592985.novalocal runuser[88819]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:56 np0005592985.novalocal sudo[88867]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:56 np0005592985.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Jan 22 22:21:56 np0005592985.novalocal sudo[88880]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Jan 22 22:21:56 np0005592985.novalocal systemd[1]: Started Session c11 of User root. Jan 22 22:21:56 np0005592985.novalocal sudo[88880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:57 np0005592985.novalocal sudo[88880]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:57 np0005592985.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Jan 22 22:21:57 np0005592985.novalocal runuser[88885]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:57 np0005592985.novalocal sudo[88901]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Jan 22 22:21:57 np0005592985.novalocal systemd[1]: Started Session c12 of User root. Jan 22 22:21:57 np0005592985.novalocal sudo[88901]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:57 np0005592985.novalocal sudo[88901]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:57 np0005592985.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Jan 22 22:21:57 np0005592985.novalocal sudo[88936]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:21:57 np0005592985.novalocal systemd[1]: Started Session c13 of User root. Jan 22 22:21:57 np0005592985.novalocal sudo[88936]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:57 np0005592985.novalocal runuser[88885]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:57 np0005592985.novalocal runuser[88946]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:57 np0005592985.novalocal sudo[88936]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:57 np0005592985.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Jan 22 22:21:57 np0005592985.novalocal sudo[88964]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:21:57 np0005592985.novalocal systemd[1]: Started Session c14 of User root. Jan 22 22:21:57 np0005592985.novalocal sudo[88964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:58 np0005592985.novalocal sudo[88964]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:58 np0005592985.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Jan 22 22:21:58 np0005592985.novalocal sudo[88996]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:21:58 np0005592985.novalocal systemd[1]: Started Session c15 of User root. Jan 22 22:21:58 np0005592985.novalocal sudo[88996]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:58 np0005592985.novalocal runuser[88946]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:58 np0005592985.novalocal runuser[89006]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:58 np0005592985.novalocal sudo[88996]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:58 np0005592985.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Jan 22 22:21:58 np0005592985.novalocal sudo[89052]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:21:58 np0005592985.novalocal systemd[1]: Started Session c16 of User root. Jan 22 22:21:58 np0005592985.novalocal sudo[89052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:59 np0005592985.novalocal sudo[89052]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:59 np0005592985.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Jan 22 22:21:59 np0005592985.novalocal runuser[89006]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:59 np0005592985.novalocal sudo[89065]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:21:59 np0005592985.novalocal systemd[1]: Started Session c17 of User root. Jan 22 22:21:59 np0005592985.novalocal sudo[89065]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:59 np0005592985.novalocal runuser[89064]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:21:59 np0005592985.novalocal sudo[89065]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:59 np0005592985.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Jan 22 22:21:59 np0005592985.novalocal sudo[89113]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:21:59 np0005592985.novalocal systemd[1]: Started Session c18 of User root. Jan 22 22:21:59 np0005592985.novalocal sudo[89113]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:21:59 np0005592985.novalocal runuser[89064]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:21:59 np0005592985.novalocal sudo[89113]: pam_unix(sudo:session): session closed for user root Jan 22 22:21:59 np0005592985.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Jan 22 22:21:59 np0005592985.novalocal sudo[89125]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:22:00 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:22:00 np0005592985.novalocal systemd[1]: Started Session c19 of User root. Jan 22 22:22:00 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:22:00 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:22:00 np0005592985.novalocal sudo[89125]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:22:00 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:00 np0005592985.novalocal sudo[89125]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:00 np0005592985.novalocal systemd-rc-local-generator[89149]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:00 np0005592985.novalocal systemd-sysv-generator[89152]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:00 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:00 np0005592985.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Jan 22 22:22:00 np0005592985.novalocal sudo[89140]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:22:00 np0005592985.novalocal systemd[1]: Started Session c20 of User root. Jan 22 22:22:00 np0005592985.novalocal sudo[89140]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:22:00 np0005592985.novalocal systemd[1]: Starting OpenStack Neutron Server... Jan 22 22:22:00 np0005592985.novalocal sudo[89140]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:00 np0005592985.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Jan 22 22:22:01 np0005592985.novalocal sudo[89170]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:22:01 np0005592985.novalocal systemd[1]: Started Session c21 of User root. Jan 22 22:22:01 np0005592985.novalocal sudo[89170]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:22:01 np0005592985.novalocal sudo[89170]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:01 np0005592985.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Jan 22 22:22:01 np0005592985.novalocal sudo[89174]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:22:01 np0005592985.novalocal systemd[1]: Started Session c22 of User root. Jan 22 22:22:01 np0005592985.novalocal sudo[89174]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:22:01 np0005592985.novalocal sudo[89174]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:01 np0005592985.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Jan 22 22:22:01 np0005592985.novalocal sudo[89178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:22:01 np0005592985.novalocal systemd[1]: Started Session c23 of User root. Jan 22 22:22:01 np0005592985.novalocal sudo[89178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:22:02 np0005592985.novalocal sudo[89178]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:02 np0005592985.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Jan 22 22:22:02 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:22:02 np0005592985.novalocal sudo[89183]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:22:02 np0005592985.novalocal systemd[1]: Started Session c24 of User root. Jan 22 22:22:02 np0005592985.novalocal sudo[89183]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:22:02 np0005592985.novalocal sudo[89183]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:02 np0005592985.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Jan 22 22:22:02 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:22:03 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Jan 22 22:22:03 np0005592985.novalocal systemd[1]: Started OpenStack Neutron Server. Jan 22 22:22:03 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:04 np0005592985.novalocal systemd-sysv-generator[89236]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:04 np0005592985.novalocal systemd-rc-local-generator[89233]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:04 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:04 np0005592985.novalocal setroubleshoot[89182]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 6d75a708-ef72-467a-a659-48ac40924952 Jan 22 22:22:04 np0005592985.novalocal setroubleshoot[89182]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Jan 22 22:22:04 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:04 np0005592985.novalocal systemd-sysv-generator[89267]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:04 np0005592985.novalocal systemd-rc-local-generator[89263]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:04 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:04 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:05 np0005592985.novalocal systemd-rc-local-generator[89296]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:05 np0005592985.novalocal systemd-sysv-generator[89301]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:05 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:05 np0005592985.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Jan 22 22:22:05 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:05 np0005592985.novalocal systemd-sysv-generator[89330]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:05 np0005592985.novalocal systemd-rc-local-generator[89326]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:05 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:05 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:06 np0005592985.novalocal systemd-rc-local-generator[89359]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:06 np0005592985.novalocal systemd-sysv-generator[89363]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:06 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:06 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:06 np0005592985.novalocal systemd-sysv-generator[89394]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:06 np0005592985.novalocal systemd-rc-local-generator[89390]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:06 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:06 np0005592985.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Jan 22 22:22:07 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:07 np0005592985.novalocal systemd-rc-local-generator[89423]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:07 np0005592985.novalocal systemd-sysv-generator[89430]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:07 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:07 np0005592985.novalocal sudo[89433]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpuzvurffs/privsep.sock Jan 22 22:22:07 np0005592985.novalocal systemd[1]: Started Session c25 of User root. Jan 22 22:22:07 np0005592985.novalocal sudo[89433]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Jan 22 22:22:07 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:07 np0005592985.novalocal systemd-rc-local-generator[89453]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:07 np0005592985.novalocal systemd-sysv-generator[89459]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:07 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:07 np0005592985.novalocal runuser[89466]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:08 np0005592985.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Jan 22 22:22:08 np0005592985.novalocal sudo[89433]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:08 np0005592985.novalocal runuser[89466]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:08 np0005592985.novalocal runuser[89522]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:09 np0005592985.novalocal runuser[89522]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:09 np0005592985.novalocal runuser[89576]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:09 np0005592985.novalocal sudo[89621]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpqipck59c/privsep.sock Jan 22 22:22:09 np0005592985.novalocal systemd[1]: Started Session c26 of User root. Jan 22 22:22:09 np0005592985.novalocal sudo[89621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Jan 22 22:22:09 np0005592985.novalocal runuser[89576]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:10 np0005592985.novalocal runuser[89632]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:10 np0005592985.novalocal sudo[89621]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:10 np0005592985.novalocal runuser[89632]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:11 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:11 np0005592985.novalocal systemd-rc-local-generator[89715]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:11 np0005592985.novalocal systemd-sysv-generator[89718]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:11 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:11 np0005592985.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Jan 22 22:22:11 np0005592985.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Jan 22 22:22:11 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:11 np0005592985.novalocal systemd-rc-local-generator[89745]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:11 np0005592985.novalocal systemd-sysv-generator[89752]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:12 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:12 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:12 np0005592985.novalocal systemd-sysv-generator[89781]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:12 np0005592985.novalocal systemd-rc-local-generator[89777]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:12 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:13 np0005592985.novalocal systemd-rc-local-generator[89811]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:13 np0005592985.novalocal systemd-sysv-generator[89815]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: Listening on libvirt locking daemon socket. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: Starting libvirt locking daemon... Jan 22 22:22:13 np0005592985.novalocal systemd[1]: Started libvirt locking daemon. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.148s CPU time. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:13 np0005592985.novalocal systemd-rc-local-generator[89840]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:13 np0005592985.novalocal systemd-sysv-generator[89847]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:13 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:14 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:14 np0005592985.novalocal systemd-rc-local-generator[89872]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:14 np0005592985.novalocal systemd-sysv-generator[89875]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:14 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:14 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:22:14 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:14 np0005592985.novalocal systemd-rc-local-generator[89908]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:15 np0005592985.novalocal systemd-sysv-generator[89911]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:15 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:15 np0005592985.novalocal systemd[1]: Listening on libvirt logging daemon socket. Jan 22 22:22:15 np0005592985.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Jan 22 22:22:15 np0005592985.novalocal systemd[1]: Starting libvirt logging daemon... Jan 22 22:22:15 np0005592985.novalocal systemd[1]: Started libvirt logging daemon. Jan 22 22:22:15 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:15 np0005592985.novalocal systemd-sysv-generator[89942]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:15 np0005592985.novalocal systemd-rc-local-generator[89939]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:15 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:15 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:16 np0005592985.novalocal systemd-sysv-generator[89969]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:16 np0005592985.novalocal systemd-rc-local-generator[89966]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:16 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:16 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:16 np0005592985.novalocal systemd-rc-local-generator[90004]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:16 np0005592985.novalocal systemd-sysv-generator[90008]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:16 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:17 np0005592985.novalocal systemd[1]: Listening on libvirt secret daemon socket. Jan 22 22:22:17 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:17 np0005592985.novalocal systemd-rc-local-generator[90038]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:17 np0005592985.novalocal systemd-sysv-generator[90042]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:17 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:18 np0005592985.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Jan 22 22:22:18 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:18 np0005592985.novalocal systemd-rc-local-generator[90073]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:18 np0005592985.novalocal systemd-sysv-generator[90076]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:18 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:19 np0005592985.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Jan 22 22:22:19 np0005592985.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Jan 22 22:22:19 np0005592985.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Jan 22 22:22:19 np0005592985.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Jan 22 22:22:19 np0005592985.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Jan 22 22:22:19 np0005592985.novalocal systemd[1]: Closed libvirt proxy daemon socket. Jan 22 22:22:19 np0005592985.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Jan 22 22:22:19 np0005592985.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Jan 22 22:22:19 np0005592985.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Jan 22 22:22:20 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:20 np0005592985.novalocal systemd-sysv-generator[90119]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:20 np0005592985.novalocal systemd-rc-local-generator[90115]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:20 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:20 np0005592985.novalocal systemd[1]: Listening on libvirt storage daemon socket. Jan 22 22:22:20 np0005592985.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Jan 22 22:22:20 np0005592985.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Jan 22 22:22:20 np0005592985.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Jan 22 22:22:20 np0005592985.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jan 22 22:22:20 np0005592985.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Jan 22 22:22:20 np0005592985.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Jan 22 22:22:21 np0005592985.novalocal systemd[1]: Starting libvirt QEMU daemon... Jan 22 22:22:21 np0005592985.novalocal systemd[1]: Started libvirt QEMU daemon. Jan 22 22:22:21 np0005592985.novalocal virtqemud[90130]: libvirt version: 11.10.0, package: 2.el9 (builder@centos.org, 2025-12-18-15:09:54, ) Jan 22 22:22:21 np0005592985.novalocal virtqemud[90130]: hostname: np0005592985.novalocal Jan 22 22:22:21 np0005592985.novalocal virtqemud[90130]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 22:22:21 np0005592985.novalocal virtqemud[90130]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 22:22:21 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:21 np0005592985.novalocal systemd-sysv-generator[90184]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:21 np0005592985.novalocal systemd-rc-local-generator[90180]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:21 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:22 np0005592985.novalocal systemd[1]: Reached target libvirt guests shutdown target. Jan 22 22:22:22 np0005592985.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Jan 22 22:22:22 np0005592985.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Jan 22 22:22:22 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:22 np0005592985.novalocal systemd-sysv-generator[90215]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:22 np0005592985.novalocal systemd-rc-local-generator[90212]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:22 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:22 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:22 np0005592985.novalocal systemd-sysv-generator[90246]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:22 np0005592985.novalocal systemd-rc-local-generator[90242]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:22 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:23 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:23 np0005592985.novalocal systemd-rc-local-generator[90280]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:23 np0005592985.novalocal systemd-sysv-generator[90283]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:23 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:23 np0005592985.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Jan 22 22:22:24 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:24 np0005592985.novalocal systemd-rc-local-generator[90313]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:24 np0005592985.novalocal systemd-sysv-generator[90318]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:24 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:24 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:24 np0005592985.novalocal systemd-rc-local-generator[90340]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:24 np0005592985.novalocal systemd-sysv-generator[90345]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:24 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:24 np0005592985.novalocal runuser[90351]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:25 np0005592985.novalocal runuser[90351]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:25 np0005592985.novalocal runuser[90403]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:26 np0005592985.novalocal runuser[90403]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:26 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:22:26 np0005592985.novalocal runuser[90457]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:26 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:22:26 np0005592985.novalocal runuser[90457]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:27 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Jan 22 22:22:27 np0005592985.novalocal runuser[90513]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:27 np0005592985.novalocal runuser[90513]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 2123dd0b-ffac-4e46-877d-b2d85d4dc309 Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l d2c71b19-d870-4b08-8f28-1bc58f8b4b55 Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 91f7131d-ee82-4e74-bb0d-78a6a753154b Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l b5a74173-aedd-4bab-927c-a41104ae85b2 Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 6c2ad838-82df-454a-a023-3ee7ed8b04a2 Jan 22 22:22:28 np0005592985.novalocal systemd-sysv-generator[90604]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:28 np0005592985.novalocal systemd-rc-local-generator[90600]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 603ab9bf-b0a4-45cc-af09-dbc688a50880 Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l aed94692-8a6d-4816-9e7f-5579a1096b07 Jan 22 22:22:28 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l ed79237b-a320-4902-95c2-580a45ff7a36 Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l a94aa0e9-9a70-4f38-b84c-39961e85e71b Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 72d79055-b5cb-47d3-82ae-bff022e5980d Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 2f10003c-74c8-4336-9fc6-6076403dea6c Jan 22 22:22:28 np0005592985.novalocal setroubleshoot[90456]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Jan 22 22:22:28 np0005592985.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Jan 22 22:22:28 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:28 np0005592985.novalocal systemd-rc-local-generator[90642]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:28 np0005592985.novalocal systemd-sysv-generator[90646]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:29 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:29 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:29 np0005592985.novalocal systemd-rc-local-generator[90670]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:29 np0005592985.novalocal systemd-sysv-generator[90674]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:29 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:29 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:29 np0005592985.novalocal systemd-rc-local-generator[90702]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:29 np0005592985.novalocal systemd-sysv-generator[90705]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:30 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:30 np0005592985.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Jan 22 22:22:30 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:30 np0005592985.novalocal systemd-sysv-generator[90737]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:30 np0005592985.novalocal systemd-rc-local-generator[90732]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:30 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:30 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:30 np0005592985.novalocal systemd-rc-local-generator[90762]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:30 np0005592985.novalocal systemd-sysv-generator[90767]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:31 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:31 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:31 np0005592985.novalocal systemd-rc-local-generator[90795]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:31 np0005592985.novalocal systemd-sysv-generator[90798]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:31 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:31 np0005592985.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Jan 22 22:22:32 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:32 np0005592985.novalocal systemd-sysv-generator[90832]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:32 np0005592985.novalocal systemd-rc-local-generator[90829]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:32 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:32 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:32 np0005592985.novalocal systemd-rc-local-generator[90856]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:32 np0005592985.novalocal systemd-sysv-generator[90862]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:32 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:32 np0005592985.novalocal runuser[90867]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:33 np0005592985.novalocal runuser[90867]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:33 np0005592985.novalocal runuser[90921]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:34 np0005592985.novalocal runuser[90921]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:34 np0005592985.novalocal runuser[90978]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:34 np0005592985.novalocal runuser[90978]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:35 np0005592985.novalocal runuser[91066]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:22:35 np0005592985.novalocal runuser[91066]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:22:36 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:36 np0005592985.novalocal systemd-rc-local-generator[91160]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:36 np0005592985.novalocal systemd-sysv-generator[91164]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:36 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:36 np0005592985.novalocal systemd[1]: Started OpenStack Manila Scheduler. Jan 22 22:22:36 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:36 np0005592985.novalocal systemd-rc-local-generator[91192]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:36 np0005592985.novalocal systemd-sysv-generator[91195]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:37 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:37 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:37 np0005592985.novalocal systemd-sysv-generator[91227]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:37 np0005592985.novalocal systemd-rc-local-generator[91223]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:37 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:37 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:38 np0005592985.novalocal systemd-rc-local-generator[91254]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:38 np0005592985.novalocal systemd-sysv-generator[91258]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:38 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:38 np0005592985.novalocal systemd[1]: Started OpenStack Manila Share Service. Jan 22 22:22:38 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:38 np0005592985.novalocal systemd-sysv-generator[91291]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:38 np0005592985.novalocal systemd-rc-local-generator[91287]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:38 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:38 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:22:38 np0005592985.novalocal systemd[1]: setroubleshootd.service: Consumed 1.492s CPU time. Jan 22 22:22:38 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Jan 22 22:22:38 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.118s CPU time. Jan 22 22:22:39 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:39 np0005592985.novalocal systemd-rc-local-generator[91316]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:39 np0005592985.novalocal systemd-sysv-generator[91319]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:39 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:39 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:39 np0005592985.novalocal systemd-sysv-generator[91353]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:39 np0005592985.novalocal systemd-rc-local-generator[91350]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:39 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:39 np0005592985.novalocal sudo[91357]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmp0ssb0gko/privsep.sock Jan 22 22:22:40 np0005592985.novalocal systemd[1]: Started Session c27 of User root. Jan 22 22:22:40 np0005592985.novalocal sudo[91357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Jan 22 22:22:40 np0005592985.novalocal systemd[1]: Started OpenStack Manila Data Server. Jan 22 22:22:40 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:40 np0005592985.novalocal systemd-rc-local-generator[91386]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:40 np0005592985.novalocal systemd-sysv-generator[91390]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:40 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:40 np0005592985.novalocal sudo[91357]: pam_unix(sudo:session): session closed for user root Jan 22 22:22:40 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:40 np0005592985.novalocal systemd-sysv-generator[91424]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:40 np0005592985.novalocal systemd-rc-local-generator[91420]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:40 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:41 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:41 np0005592985.novalocal systemd-rc-local-generator[91453]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:41 np0005592985.novalocal systemd-sysv-generator[91456]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:41 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:41 np0005592985.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Jan 22 22:22:42 np0005592985.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Jan 22 22:22:42 np0005592985.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Jan 22 22:22:42 np0005592985.novalocal systemd[1]: Starting The Apache HTTP Server... Jan 22 22:22:42 np0005592985.novalocal python3[91466]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Jan 22 22:22:42 np0005592985.novalocal python3[91466]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Jan 22 22:22:43 np0005592985.novalocal python3[91466]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Jan 22 22:22:43 np0005592985.novalocal python3[91466]: version_info = version.StrictVersion(__version__).version Jan 22 22:22:45 np0005592985.novalocal python3[91470]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Jan 22 22:22:45 np0005592985.novalocal python3[91470]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Jan 22 22:22:45 np0005592985.novalocal python3[91470]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Jan 22 22:22:45 np0005592985.novalocal python3[91470]: version_info = version.StrictVersion(__version__).version Jan 22 22:22:53 np0005592985.novalocal httpd[91478]: Server configured, listening on: ::1 port 9876, ... Jan 22 22:22:53 np0005592985.novalocal systemd[1]: Started The Apache HTTP Server. Jan 22 22:22:53 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:53 np0005592985.novalocal systemd-sysv-generator[91592]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:53 np0005592985.novalocal systemd-rc-local-generator[91589]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:53 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:53 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:22:53 np0005592985.novalocal systemd-rc-local-generator[91615]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:22:53 np0005592985.novalocal systemd-sysv-generator[91620]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:22:54 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:22:54 np0005592985.novalocal crontab[91628]: (root) REPLACE (keystone) Jan 22 22:22:56 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:22:56 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:22:56 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l e578cfa6-9293-4778-a91e-b6d36739c338 Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 01e8a962-4cb2-483a-a8ca-dbc04542d202 Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 2cfc36c1-a418-4cbb-af6c-5d582ed178c2 Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa': Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. For complete SELinux messages run: sealert -l 892d291a-bb4c-493a-b373-a8e1c5b1d0fa Jan 22 22:22:58 np0005592985.novalocal setroubleshoot[91631]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:23:02 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:23:02 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:23:02 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:23:02 np0005592985.novalocal sudo[91649]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:23:02 np0005592985.novalocal systemd[1]: Started Session c28 of User root. Jan 22 22:23:02 np0005592985.novalocal sudo[91649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:23:03 np0005592985.novalocal sudo[91649]: pam_unix(sudo:session): session closed for user root Jan 22 22:23:03 np0005592985.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Jan 22 22:23:03 np0005592985.novalocal sudo[91653]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:23:03 np0005592985.novalocal systemd[1]: Started Session c29 of User root. Jan 22 22:23:03 np0005592985.novalocal sudo[91653]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:23:03 np0005592985.novalocal sudo[91653]: pam_unix(sudo:session): session closed for user root Jan 22 22:23:03 np0005592985.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Jan 22 22:23:03 np0005592985.novalocal sudo[91658]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:23:03 np0005592985.novalocal systemd[1]: Started Session c30 of User root. Jan 22 22:23:03 np0005592985.novalocal sudo[91658]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:23:04 np0005592985.novalocal sudo[91658]: pam_unix(sudo:session): session closed for user root Jan 22 22:23:04 np0005592985.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Jan 22 22:23:04 np0005592985.novalocal sudo[91664]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:23:04 np0005592985.novalocal systemd[1]: Started Session c31 of User root. Jan 22 22:23:04 np0005592985.novalocal sudo[91664]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:23:04 np0005592985.novalocal sudo[91664]: pam_unix(sudo:session): session closed for user root Jan 22 22:23:04 np0005592985.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Jan 22 22:23:08 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Jan 22 22:23:08 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.194s CPU time. Jan 22 22:23:08 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:23:08 np0005592985.novalocal systemd[1]: setroubleshootd.service: Consumed 1.106s CPU time. Jan 22 22:23:32 np0005592985.novalocal octavia-health-manager[90808]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1594: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Jan 22 22:23:32 np0005592985.novalocal octavia-health-manager[90808]: self.model_class.amphora_id.in_(expired_ids_query) Jan 22 22:24:02 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:24:02 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:24:02 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:24:02 np0005592985.novalocal sudo[91745]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:24:02 np0005592985.novalocal systemd[1]: Started Session c32 of User root. Jan 22 22:24:02 np0005592985.novalocal sudo[91745]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:03 np0005592985.novalocal sudo[91745]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:03 np0005592985.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Jan 22 22:24:03 np0005592985.novalocal sudo[91749]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:24:03 np0005592985.novalocal systemd[1]: Started Session c33 of User root. Jan 22 22:24:03 np0005592985.novalocal sudo[91749]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:03 np0005592985.novalocal sudo[91749]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:03 np0005592985.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Jan 22 22:24:03 np0005592985.novalocal sudo[91753]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:24:03 np0005592985.novalocal systemd[1]: Started Session c34 of User root. Jan 22 22:24:03 np0005592985.novalocal sudo[91753]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:04 np0005592985.novalocal sudo[91753]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:04 np0005592985.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Jan 22 22:24:04 np0005592985.novalocal sudo[91758]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:24:04 np0005592985.novalocal systemd[1]: Started Session c35 of User root. Jan 22 22:24:04 np0005592985.novalocal sudo[91758]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:04 np0005592985.novalocal sudo[91758]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:04 np0005592985.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Jan 22 22:24:09 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:24:10 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:24:10 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Jan 22 22:24:11 np0005592985.novalocal setroubleshoot[91768]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 60ce1466-c38a-433f-9187-59003e1fb069 Jan 22 22:24:11 np0005592985.novalocal setroubleshoot[91768]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:24:11 np0005592985.novalocal setroubleshoot[91768]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 44d2b73e-d66f-4a7e-bc8c-1af749300713 Jan 22 22:24:11 np0005592985.novalocal setroubleshoot[91768]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:24:11 np0005592985.novalocal setroubleshoot[91768]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l bb2a0b1e-2212-418a-8e0c-af89901105a6 Jan 22 22:24:11 np0005592985.novalocal setroubleshoot[91768]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:24:21 np0005592985.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Jan 22 22:24:21 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Jan 22 22:24:21 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.137s CPU time. Jan 22 22:24:21 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:24:21 np0005592985.novalocal systemd[1]: setroubleshootd.service: Consumed 1.072s CPU time. Jan 22 22:24:38 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:24:39 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:24:39 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Jan 22 22:24:40 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 60ce1466-c38a-433f-9187-59003e1fb069 Jan 22 22:24:40 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:24:40 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 44d2b73e-d66f-4a7e-bc8c-1af749300713 Jan 22 22:24:40 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:24:40 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l bb2a0b1e-2212-418a-8e0c-af89901105a6 Jan 22 22:24:40 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:24:44 np0005592985.novalocal sudo[91873]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 cinder-volumes/cinder-volumes-pool Jan 22 22:24:44 np0005592985.novalocal systemd[1]: Started Session c36 of User root. Jan 22 22:24:44 np0005592985.novalocal sudo[91873]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:44 np0005592985.novalocal dmeventd[88680]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Jan 22 22:24:45 np0005592985.novalocal dmeventd[88680]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Jan 22 22:24:45 np0005592985.novalocal lvm[91930]: PV /dev/loop2 online, VG cinder-volumes is complete. Jan 22 22:24:45 np0005592985.novalocal lvm[91930]: VG cinder-volumes finished Jan 22 22:24:46 np0005592985.novalocal sudo[91873]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:46 np0005592985.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Jan 22 22:24:47 np0005592985.novalocal sudo[91932]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmph447fzl3/privsep.sock Jan 22 22:24:47 np0005592985.novalocal systemd[1]: Started Session c37 of User root. Jan 22 22:24:47 np0005592985.novalocal sudo[91932]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 22:24:47 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 46b9a9bd-a688-428d-8558-5e05f7d423b2 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l e2057ebd-6244-4f97-995f-7d013935fd7f Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 05afbb5d-1f89-4ab2-a926-380103fc3557 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 9239427b-f7e4-4fe8-86e7-ae7ca70be952 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 4ec98d08-5ffa-44c8-94be-1b4cfd00bce0 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7d853a19-e0e3-4a92-ad24-040cf0baabd6 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 4ec98d08-5ffa-44c8-94be-1b4cfd00bce0 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7d853a19-e0e3-4a92-ad24-040cf0baabd6 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:48 np0005592985.novalocal sudo[91932]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 46b9a9bd-a688-428d-8558-5e05f7d423b2 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l f8c2edb6-266d-408c-b6be-5fa7793a7b97 Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:48 np0005592985.novalocal setroubleshoot[91845]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 13f50c71-1f9e-4481-af19-f86fafc64bea Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: failed to retrieve rpm info for path '/dev/vda1': Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 97799df9-493d-404f-9790-51aa12bed255 Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l c5625c61-4883-480f-a75d-83e6517c90da Jan 22 22:24:49 np0005592985.novalocal sudo[91964]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2d971824-10c1-407e-b2dc-1c1091dd9a88 Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 0b3bf1f1-b3e0-46d9-b3b7-fa0b472d87bd Jan 22 22:24:49 np0005592985.novalocal systemd[1]: Started Session c38 of User root. Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal sudo[91964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l b223dbf8-d29a-4e1a-bc99-6df5792232a2 Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l d79b9dcc-09e4-4a66-82b9-195253512f9a Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 668f4647-f813-432b-bd29-244d867264e5 Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l f783d8d2-c6c6-4099-a81d-5e830a8366fb Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-kJX8Mt. For complete SELinux messages run: sealert -l c675328a-20bc-4079-8303-ea9c3ef91eda Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-kJX8Mt. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-kJX8Mt file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-kJX8Mt. For complete SELinux messages run: sealert -l 6f73aa0e-f99f-4fc3-b273-f23a5cd1ccc2 Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-kJX8Mt. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-kJX8Mt file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 2385e807-6476-422b-b5c2-c3396232955f Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l d6bed13a-d033-4984-9268-a6c850340265 Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 5c8e5c9a-6134-4f27-9e0c-cd49a4974f9e Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 68ff47bd-165e-407a-97dd-eb9fe4a3124c Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l cbcb00b9-623f-415a-9d82-122b96c44d17 Jan 22 22:24:49 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:49 np0005592985.novalocal sudo[91964]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:49 np0005592985.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Jan 22 22:24:49 np0005592985.novalocal sudo[91968]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 rDSbPY3Ewy7suV2HkCKB Q6vzqFKry5H2gREM False -p3260 -a::1 Jan 22 22:24:49 np0005592985.novalocal systemd[1]: Started Session c39 of User root. Jan 22 22:24:49 np0005592985.novalocal sudo[91968]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:50 np0005592985.novalocal sudo[91968]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:50 np0005592985.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Jan 22 22:24:50 np0005592985.novalocal sudo[91983]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Jan 22 22:24:50 np0005592985.novalocal systemd[1]: Started Session c40 of User root. Jan 22 22:24:50 np0005592985.novalocal sudo[91983]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:50 np0005592985.novalocal sudo[91983]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:50 np0005592985.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Jan 22 22:24:50 np0005592985.novalocal sudo[91988]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 22:24:50 np0005592985.novalocal systemd[1]: Started Session c41 of User root. Jan 22 22:24:50 np0005592985.novalocal sudo[91988]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:51 np0005592985.novalocal sudo[91988]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:51 np0005592985.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Jan 22 22:24:51 np0005592985.novalocal sudo[91993]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 rDSbPY3Ewy7suV2HkCKB Q6vzqFKry5H2gREM iqn.1994-05.com.redhat:46e5980beb3 Jan 22 22:24:51 np0005592985.novalocal systemd[1]: Started Session c42 of User root. Jan 22 22:24:51 np0005592985.novalocal sudo[91993]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:51 np0005592985.novalocal sudo[91993]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:51 np0005592985.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Jan 22 22:24:51 np0005592985.novalocal sudo[91998]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 22:24:51 np0005592985.novalocal systemd[1]: Started Session c43 of User root. Jan 22 22:24:51 np0005592985.novalocal sudo[91998]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:52 np0005592985.novalocal sudo[91998]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:52 np0005592985.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 1be49e88-c3ce-459c-af39-7bb920863883 Jan 22 22:24:52 np0005592985.novalocal kernel: iscsi: registered transport (tcp) Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Jan 22 22:24:52 np0005592985.novalocal iscsid[73580]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3, portal: ::1,3260] through [iface: default] is operational now Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l dc8e6001-c682-42a0-9267-d1e3be0e21fa Jan 22 22:24:52 np0005592985.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Jan 22 22:24:52 np0005592985.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Jan 22 22:24:52 np0005592985.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014059c66eb50c6bb49ac9736ad847 port group 0 rel port 1 Jan 22 22:24:52 np0005592985.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Jan 22 22:24:52 np0005592985.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Jan 22 22:24:52 np0005592985.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Jan 22 22:24:52 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Jan 22 22:24:52 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Jan 22 22:24:52 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Jan 22 22:24:52 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Jan 22 22:24:52 np0005592985.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 22:24:52 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Jan 22 22:24:52 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Jan 22 22:24:52 np0005592985.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 22:24:52 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 33cd1dfc-9d81-434a-bffd-104bceecfbc3 Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 6857c62a-09ac-4e72-ae18-248d58d3cd83 Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e3f92a2f-251c-4746-811e-707aaa87c853 Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 0613842a-ec18-4af4-9a0d-42be4dd2fec8 Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 0912e15c-1a78-47c7-b9fe-77f38c5f486a Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 3632d6bc-244a-4bf3-8444-62cede8664b0 Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a8cfe569-8cef-49b3-ade4-005d53ad0f90 Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l c4f8463c-1af0-4f42-9187-81773564bcec Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:52 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 13c91ecb-6853-4d98-84a5-014b71ea66e0 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 117ae897-8bb5-4aaf-9c61-5174803f6a69 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 392b2ba8-4083-41ee-b01d-002326335ba2 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3/::1,3260. For complete SELinux messages run: sealert -l 7bdbfdec-1a22-48b9-9284-0e6a6139f6a4 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3/::1,3260. For complete SELinux messages run: sealert -l 77f239ab-ae42-44b0-9373-b94eae4f8ec6 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 6240ae31-10ad-40a0-8a04-e085126c9840 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 6857c62a-09ac-4e72-ae18-248d58d3cd83 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e3f92a2f-251c-4746-811e-707aaa87c853 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3/::1,3260. For complete SELinux messages run: sealert -l 77f239ab-ae42-44b0-9373-b94eae4f8ec6 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 6240ae31-10ad-40a0-8a04-e085126c9840 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3/::1,3260. For complete SELinux messages run: sealert -l 37196699-bcfa-4ded-8862-31b338d0336b Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l b15696f7-33bf-4d40-b01a-22fc9ca9d03e Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 3632d6bc-244a-4bf3-8444-62cede8664b0 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:53 np0005592985.novalocal sudo[92048]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Jan 22 22:24:53 np0005592985.novalocal systemd[1]: Started Session c44 of User root. Jan 22 22:24:53 np0005592985.novalocal sudo[92048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l da735159-710b-4d51-9306-e05aab309621 Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 22:24:53 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l ed3028ac-4425-44da-9c59-f12c3e7d3b1f Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 97d517c3-e914-44cf-bf61-4133fcbc6d10 Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: failed to retrieve rpm info for path '/dev/sda': Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 97799df9-493d-404f-9790-51aa12bed255 Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 46b9a9bd-a688-428d-8558-5e05f7d423b2 Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l e2057ebd-6244-4f97-995f-7d013935fd7f Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 05afbb5d-1f89-4ab2-a926-380103fc3557 Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 9239427b-f7e4-4fe8-86e7-ae7ca70be952 Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 4ec98d08-5ffa-44c8-94be-1b4cfd00bce0 Jan 22 22:24:54 np0005592985.novalocal sudo[92048]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:54 np0005592985.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7d853a19-e0e3-4a92-ad24-040cf0baabd6 Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 97799df9-493d-404f-9790-51aa12bed255 Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l f2b3eb97-8dda-4a8f-bc8c-4fa8afe4be9b Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 3dde56f4-d828-40b5-834c-62b0cf15316d Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2d971824-10c1-407e-b2dc-1c1091dd9a88 Jan 22 22:24:54 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:55 np0005592985.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 0b3bf1f1-b3e0-46d9-b3b7-fa0b472d87bd Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:55 np0005592985.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 22 22:24:55 np0005592985.novalocal kernel: GPT:229375 != 2097151 Jan 22 22:24:55 np0005592985.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Jan 22 22:24:55 np0005592985.novalocal kernel: GPT:229375 != 2097151 Jan 22 22:24:55 np0005592985.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Jan 22 22:24:55 np0005592985.novalocal kernel: sda: sda1 sda15 Jan 22 22:24:55 np0005592985.novalocal sudo[92063]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Jan 22 22:24:55 np0005592985.novalocal systemd[1]: Started Session c45 of User root. Jan 22 22:24:55 np0005592985.novalocal sudo[92063]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 22:24:55 np0005592985.novalocal sudo[92063]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:55 np0005592985.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 1be49e88-c3ce-459c-af39-7bb920863883 Jan 22 22:24:55 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 0912e15c-1a78-47c7-b9fe-77f38c5f486a Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l dc8e6001-c682-42a0-9267-d1e3be0e21fa Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 33cd1dfc-9d81-434a-bffd-104bceecfbc3 Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 0613842a-ec18-4af4-9a0d-42be4dd2fec8 Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a8cfe569-8cef-49b3-ade4-005d53ad0f90 Jan 22 22:24:55 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 6b4ba6a6-2e3c-44ac-b731-aeaf6e81ee88 Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 214bbaf1-b796-410c-b4da-8819f02fd8ed Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 7d3fc4d8-31b9-42d1-a313-534d7a15aaef Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 22:24:56 np0005592985.novalocal kernel: scsi 2:0:0:0: alua: Detached Jan 22 22:24:56 np0005592985.novalocal iscsid[73580]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3, portal: ::1,3260] through [iface: default] is shutdown. Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l c5625c61-4883-480f-a75d-83e6517c90da Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:24:56 np0005592985.novalocal sudo[92105]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 iqn.1994-05.com.redhat:46e5980beb3 Jan 22 22:24:56 np0005592985.novalocal systemd[1]: Started Session c46 of User root. Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3. For complete SELinux messages run: sealert -l c4f8463c-1af0-4f42-9187-81773564bcec Jan 22 22:24:56 np0005592985.novalocal sudo[92105]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l bf5818fe-9db0-4486-a96a-8c1f54e880f0 Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l e0d24c07-afe2-4351-a33b-463bbabeea68 Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3. For complete SELinux messages run: sealert -l 36887cd5-22af-42f6-8c28-411b9a97aef2 Jan 22 22:24:56 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:24:57 np0005592985.novalocal sudo[92105]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:57 np0005592985.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Jan 22 22:24:57 np0005592985.novalocal sudo[92112]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 22:24:57 np0005592985.novalocal systemd[1]: Started Session c47 of User root. Jan 22 22:24:57 np0005592985.novalocal sudo[92112]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:57 np0005592985.novalocal sudo[92112]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:57 np0005592985.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Jan 22 22:24:57 np0005592985.novalocal sudo[92117]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Jan 22 22:24:57 np0005592985.novalocal systemd[1]: Started Session c48 of User root. Jan 22 22:24:57 np0005592985.novalocal sudo[92117]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:58 np0005592985.novalocal sudo[92117]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:58 np0005592985.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Jan 22 22:24:58 np0005592985.novalocal sudo[92122]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-fcb371f9-c2be-49ec-8ac0-d68a538ee7c3 Jan 22 22:24:58 np0005592985.novalocal systemd[1]: Started Session c49 of User root. Jan 22 22:24:58 np0005592985.novalocal sudo[92122]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:58 np0005592985.novalocal sudo[92122]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:58 np0005592985.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Jan 22 22:24:58 np0005592985.novalocal sudo[92127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 22:24:58 np0005592985.novalocal systemd[1]: Started Session c50 of User root. Jan 22 22:24:58 np0005592985.novalocal sudo[92127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:24:59 np0005592985.novalocal sudo[92127]: pam_unix(sudo:session): session closed for user root Jan 22 22:24:59 np0005592985.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Jan 22 22:25:02 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:25:02 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:25:02 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:25:02 np0005592985.novalocal sudo[92135]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:25:02 np0005592985.novalocal systemd[1]: Started Session c51 of User root. Jan 22 22:25:02 np0005592985.novalocal sudo[92135]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:03 np0005592985.novalocal sudo[92135]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:03 np0005592985.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Jan 22 22:25:03 np0005592985.novalocal sudo[92139]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:25:03 np0005592985.novalocal systemd[1]: Started Session c52 of User root. Jan 22 22:25:03 np0005592985.novalocal sudo[92139]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:03 np0005592985.novalocal sudo[92139]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:03 np0005592985.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Jan 22 22:25:03 np0005592985.novalocal sudo[92143]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:25:03 np0005592985.novalocal systemd[1]: Started Session c53 of User root. Jan 22 22:25:03 np0005592985.novalocal sudo[92143]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:03 np0005592985.novalocal sudo[92146]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e cinder-volumes/cinder-volumes-pool Jan 22 22:25:03 np0005592985.novalocal systemd[1]: Started Session c54 of User root. Jan 22 22:25:03 np0005592985.novalocal sudo[92146]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:04 np0005592985.novalocal sudo[92143]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:04 np0005592985.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Jan 22 22:25:04 np0005592985.novalocal sudo[92152]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:25:04 np0005592985.novalocal systemd[1]: Started Session c55 of User root. Jan 22 22:25:04 np0005592985.novalocal sudo[92152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:04 np0005592985.novalocal lvm[92164]: PV /dev/loop2 online, VG cinder-volumes is complete. Jan 22 22:25:04 np0005592985.novalocal lvm[92164]: VG cinder-volumes finished Jan 22 22:25:04 np0005592985.novalocal sudo[92146]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:04 np0005592985.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Jan 22 22:25:04 np0005592985.novalocal sudo[92152]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:04 np0005592985.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 47e807b2-d8f4-4a1b-b9a6-0e7649c91700 Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 15b8542f-2f31-4c4e-b8f3-a26e1a5f239c Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 97799df9-493d-404f-9790-51aa12bed255 Jan 22 22:25:05 np0005592985.novalocal sudo[92180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal systemd[1]: Started Session c56 of User root. Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l c5625c61-4883-480f-a75d-83e6517c90da Jan 22 22:25:05 np0005592985.novalocal sudo[92180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2d971824-10c1-407e-b2dc-1c1091dd9a88 Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 0b3bf1f1-b3e0-46d9-b3b7-fa0b472d87bd Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 9c8c059b-5bb5-409c-9dad-39fda377b04d Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l d79b9dcc-09e4-4a66-82b9-195253512f9a Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 668f4647-f813-432b-bd29-244d867264e5 Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l f783d8d2-c6c6-4099-a81d-5e830a8366fb Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-KtU0w7. For complete SELinux messages run: sealert -l 6f73aa0e-f99f-4fc3-b273-f23a5cd1ccc2 Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-KtU0w7. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-KtU0w7 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 2385e807-6476-422b-b5c2-c3396232955f Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l cbcb00b9-623f-415a-9d82-122b96c44d17 Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 418b9f48-c1a9-4dfc-81fe-1bce9c20cbbd Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 68ff47bd-165e-407a-97dd-eb9fe4a3124c Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l d6bed13a-d033-4984-9268-a6c850340265 Jan 22 22:25:05 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:05 np0005592985.novalocal sudo[92180]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:05 np0005592985.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Jan 22 22:25:05 np0005592985.novalocal sudo[92184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e zGKfNbBXVvxcrC7VQusd MbmnC4koP4YoNxMy False -p3260 -a::1 Jan 22 22:25:05 np0005592985.novalocal systemd[1]: Started Session c57 of User root. Jan 22 22:25:05 np0005592985.novalocal sudo[92184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:06 np0005592985.novalocal sudo[92184]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:06 np0005592985.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Jan 22 22:25:06 np0005592985.novalocal sudo[92190]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Jan 22 22:25:06 np0005592985.novalocal systemd[1]: Started Session c58 of User root. Jan 22 22:25:06 np0005592985.novalocal sudo[92190]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:07 np0005592985.novalocal sudo[92190]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:07 np0005592985.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Jan 22 22:25:07 np0005592985.novalocal sudo[92195]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 22:25:07 np0005592985.novalocal systemd[1]: Started Session c59 of User root. Jan 22 22:25:07 np0005592985.novalocal sudo[92195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:07 np0005592985.novalocal sudo[92195]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:07 np0005592985.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Jan 22 22:25:07 np0005592985.novalocal sudo[92200]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e zGKfNbBXVvxcrC7VQusd MbmnC4koP4YoNxMy iqn.1994-05.com.redhat:46e5980beb3 Jan 22 22:25:07 np0005592985.novalocal systemd[1]: Started Session c60 of User root. Jan 22 22:25:07 np0005592985.novalocal sudo[92200]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:08 np0005592985.novalocal sudo[92200]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:08 np0005592985.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Jan 22 22:25:08 np0005592985.novalocal sudo[92206]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 22:25:08 np0005592985.novalocal systemd[1]: Started Session c61 of User root. Jan 22 22:25:08 np0005592985.novalocal sudo[92206]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:08 np0005592985.novalocal sudo[92206]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:08 np0005592985.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 1be49e88-c3ce-459c-af39-7bb920863883 Jan 22 22:25:09 np0005592985.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Jan 22 22:25:09 np0005592985.novalocal iscsid[73580]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e, portal: ::1,3260] through [iface: default] is operational now Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Jan 22 22:25:09 np0005592985.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Jan 22 22:25:09 np0005592985.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140556427aa7fec34f858df8c4c37 port group 0 rel port 1 Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Jan 22 22:25:09 np0005592985.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Jan 22 22:25:09 np0005592985.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 22:25:09 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l dc8e6001-c682-42a0-9267-d1e3be0e21fa Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 33cd1dfc-9d81-434a-bffd-104bceecfbc3 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 6857c62a-09ac-4e72-ae18-248d58d3cd83 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e3f92a2f-251c-4746-811e-707aaa87c853 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 0613842a-ec18-4af4-9a0d-42be4dd2fec8 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 0912e15c-1a78-47c7-b9fe-77f38c5f486a Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 3632d6bc-244a-4bf3-8444-62cede8664b0 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a8cfe569-8cef-49b3-ade4-005d53ad0f90 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l c4f8463c-1af0-4f42-9187-81773564bcec Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 13c91ecb-6853-4d98-84a5-014b71ea66e0 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 117ae897-8bb5-4aaf-9c61-5174803f6a69 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 392b2ba8-4083-41ee-b01d-002326335ba2 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e/::1,3260. For complete SELinux messages run: sealert -l 7bdbfdec-1a22-48b9-9284-0e6a6139f6a4 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e/::1,3260. For complete SELinux messages run: sealert -l 77f239ab-ae42-44b0-9373-b94eae4f8ec6 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 6240ae31-10ad-40a0-8a04-e085126c9840 Jan 22 22:25:09 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:10 np0005592985.novalocal sudo[92256]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l da735159-710b-4d51-9306-e05aab309621 Jan 22 22:25:10 np0005592985.novalocal systemd[1]: Started Session c62 of User root. Jan 22 22:25:10 np0005592985.novalocal sudo[92256]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l ed3028ac-4425-44da-9c59-f12c3e7d3b1f Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 97d517c3-e914-44cf-bf61-4133fcbc6d10 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 97799df9-493d-404f-9790-51aa12bed255 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 46b9a9bd-a688-428d-8558-5e05f7d423b2 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l e2057ebd-6244-4f97-995f-7d013935fd7f Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 05afbb5d-1f89-4ab2-a926-380103fc3557 Jan 22 22:25:10 np0005592985.novalocal sudo[92256]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:10 np0005592985.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 9239427b-f7e4-4fe8-86e7-ae7ca70be952 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 4ec98d08-5ffa-44c8-94be-1b4cfd00bce0 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7d853a19-e0e3-4a92-ad24-040cf0baabd6 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 4ec98d08-5ffa-44c8-94be-1b4cfd00bce0 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 7d853a19-e0e3-4a92-ad24-040cf0baabd6 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 46b9a9bd-a688-428d-8558-5e05f7d423b2 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l f2b3eb97-8dda-4a8f-bc8c-4fa8afe4be9b Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 3dde56f4-d828-40b5-834c-62b0cf15316d Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2d971824-10c1-407e-b2dc-1c1091dd9a88 Jan 22 22:25:10 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:11 np0005592985.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Jan 22 22:25:11 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 0b3bf1f1-b3e0-46d9-b3b7-fa0b472d87bd Jan 22 22:25:11 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:11 np0005592985.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 22 22:25:11 np0005592985.novalocal kernel: GPT:229375 != 2097151 Jan 22 22:25:11 np0005592985.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Jan 22 22:25:11 np0005592985.novalocal kernel: GPT:229375 != 2097151 Jan 22 22:25:11 np0005592985.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Jan 22 22:25:11 np0005592985.novalocal kernel: sda: sda1 sda15 Jan 22 22:25:11 np0005592985.novalocal sudo[92264]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Jan 22 22:25:11 np0005592985.novalocal systemd[1]: Started Session c63 of User root. Jan 22 22:25:11 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l e2057ebd-6244-4f97-995f-7d013935fd7f Jan 22 22:25:11 np0005592985.novalocal sudo[92264]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Jan 22 22:25:11 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:25:11 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 05afbb5d-1f89-4ab2-a926-380103fc3557 Jan 22 22:25:11 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:25:11 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 9239427b-f7e4-4fe8-86e7-ae7ca70be952 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Jan 22 22:25:12 np0005592985.novalocal sudo[92264]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:12 np0005592985.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 0912e15c-1a78-47c7-b9fe-77f38c5f486a Jan 22 22:25:12 np0005592985.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e/::1,3260. For complete SELinux messages run: sealert -l 77f239ab-ae42-44b0-9373-b94eae4f8ec6 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l dc8e6001-c682-42a0-9267-d1e3be0e21fa Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 33cd1dfc-9d81-434a-bffd-104bceecfbc3 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 6857c62a-09ac-4e72-ae18-248d58d3cd83 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e3f92a2f-251c-4746-811e-707aaa87c853 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 0613842a-ec18-4af4-9a0d-42be4dd2fec8 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 6240ae31-10ad-40a0-8a04-e085126c9840 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e/::1,3260. For complete SELinux messages run: sealert -l b2566406-e562-4559-ac2c-a20fef0609bb Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 3632d6bc-244a-4bf3-8444-62cede8664b0 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a8cfe569-8cef-49b3-ade4-005d53ad0f90 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 1be49e88-c3ce-459c-af39-7bb920863883 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 6b4ba6a6-2e3c-44ac-b731-aeaf6e81ee88 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 214bbaf1-b796-410c-b4da-8819f02fd8ed Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 7d3fc4d8-31b9-42d1-a313-534d7a15aaef Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l c5625c61-4883-480f-a75d-83e6517c90da Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Jan 22 22:25:12 np0005592985.novalocal kernel: scsi 2:0:0:0: alua: Detached Jan 22 22:25:12 np0005592985.novalocal iscsid[73580]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e, portal: ::1,3260] through [iface: default] is shutdown. Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 97d517c3-e914-44cf-bf61-4133fcbc6d10 Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Jan 22 22:25:12 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l b15696f7-33bf-4d40-b01a-22fc9ca9d03e Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e. For complete SELinux messages run: sealert -l c4f8463c-1af0-4f42-9187-81773564bcec Jan 22 22:25:13 np0005592985.novalocal sudo[92307]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e iqn.1994-05.com.redhat:46e5980beb3 Jan 22 22:25:13 np0005592985.novalocal systemd[1]: Started Session c64 of User root. Jan 22 22:25:13 np0005592985.novalocal sudo[92307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l bf5818fe-9db0-4486-a96a-8c1f54e880f0 Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l e0d24c07-afe2-4351-a33b-463bbabeea68 Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e. For complete SELinux messages run: sealert -l 36887cd5-22af-42f6-8c28-411b9a97aef2 Jan 22 22:25:13 np0005592985.novalocal setroubleshoot[91845]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Jan 22 22:25:13 np0005592985.novalocal sudo[92307]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:13 np0005592985.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Jan 22 22:25:13 np0005592985.novalocal sudo[92314]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 22:25:13 np0005592985.novalocal systemd[1]: Started Session c65 of User root. Jan 22 22:25:13 np0005592985.novalocal sudo[92314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:14 np0005592985.novalocal sudo[92314]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:14 np0005592985.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Jan 22 22:25:14 np0005592985.novalocal sudo[92319]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Jan 22 22:25:14 np0005592985.novalocal systemd[1]: Started Session c66 of User root. Jan 22 22:25:14 np0005592985.novalocal sudo[92319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:14 np0005592985.novalocal sudo[92319]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:14 np0005592985.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Jan 22 22:25:14 np0005592985.novalocal sudo[92326]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-22ab1d62-3081-4f00-b9ab-c1d4cafa2e1e Jan 22 22:25:14 np0005592985.novalocal systemd[1]: Started Session c67 of User root. Jan 22 22:25:14 np0005592985.novalocal sudo[92326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:15 np0005592985.novalocal sudo[92326]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:15 np0005592985.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Jan 22 22:25:15 np0005592985.novalocal sudo[92331]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Jan 22 22:25:15 np0005592985.novalocal systemd[1]: Started Session c68 of User root. Jan 22 22:25:15 np0005592985.novalocal sudo[92331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:25:15 np0005592985.novalocal sudo[92331]: pam_unix(sudo:session): session closed for user root Jan 22 22:25:15 np0005592985.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Jan 22 22:25:23 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Jan 22 22:25:23 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.264s CPU time. Jan 22 22:25:23 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:25:23 np0005592985.novalocal systemd[1]: setroubleshootd.service: Consumed 7.041s CPU time. Jan 22 22:26:02 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:26:02 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:26:02 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:26:02 np0005592985.novalocal sudo[92409]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:26:02 np0005592985.novalocal systemd[1]: Started Session c69 of User root. Jan 22 22:26:02 np0005592985.novalocal sudo[92409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:26:03 np0005592985.novalocal sudo[92409]: pam_unix(sudo:session): session closed for user root Jan 22 22:26:03 np0005592985.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Jan 22 22:26:03 np0005592985.novalocal sudo[92413]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:26:03 np0005592985.novalocal systemd[1]: Started Session c70 of User root. Jan 22 22:26:03 np0005592985.novalocal sudo[92413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:26:03 np0005592985.novalocal sudo[92413]: pam_unix(sudo:session): session closed for user root Jan 22 22:26:03 np0005592985.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Jan 22 22:26:03 np0005592985.novalocal sudo[92417]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:26:03 np0005592985.novalocal systemd[1]: Started Session c71 of User root. Jan 22 22:26:03 np0005592985.novalocal sudo[92417]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:26:04 np0005592985.novalocal sudo[92417]: pam_unix(sudo:session): session closed for user root Jan 22 22:26:04 np0005592985.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Jan 22 22:26:04 np0005592985.novalocal sudo[92422]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:26:04 np0005592985.novalocal systemd[1]: Started Session c72 of User root. Jan 22 22:26:04 np0005592985.novalocal sudo[92422]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:26:04 np0005592985.novalocal sudo[92422]: pam_unix(sudo:session): session closed for user root Jan 22 22:26:04 np0005592985.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Jan 22 22:27:02 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:27:02 np0005592985.novalocal sudo[92502]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:27:02 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:27:02 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:27:02 np0005592985.novalocal systemd[1]: Started Session c73 of User root. Jan 22 22:27:02 np0005592985.novalocal sudo[92502]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:27:03 np0005592985.novalocal sudo[92502]: pam_unix(sudo:session): session closed for user root Jan 22 22:27:03 np0005592985.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Jan 22 22:27:03 np0005592985.novalocal sudo[92508]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:27:03 np0005592985.novalocal systemd[1]: Started Session c74 of User root. Jan 22 22:27:03 np0005592985.novalocal sudo[92508]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:27:03 np0005592985.novalocal sudo[92508]: pam_unix(sudo:session): session closed for user root Jan 22 22:27:03 np0005592985.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Jan 22 22:27:03 np0005592985.novalocal sudo[92512]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:27:03 np0005592985.novalocal systemd[1]: Started Session c75 of User root. Jan 22 22:27:03 np0005592985.novalocal sudo[92512]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:27:04 np0005592985.novalocal sudo[92512]: pam_unix(sudo:session): session closed for user root Jan 22 22:27:04 np0005592985.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Jan 22 22:27:04 np0005592985.novalocal sudo[92517]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:27:04 np0005592985.novalocal systemd[1]: Started Session c76 of User root. Jan 22 22:27:04 np0005592985.novalocal sudo[92517]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:27:04 np0005592985.novalocal sudo[92517]: pam_unix(sudo:session): session closed for user root Jan 22 22:27:04 np0005592985.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Jan 22 22:27:29 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:29 np0005592985.novalocal systemd-rc-local-generator[92563]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:29 np0005592985.novalocal systemd-sysv-generator[92568]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:29 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:29 np0005592985.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Jan 22 22:27:31 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:27:32 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:27:32 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Jan 22 22:27:33 np0005592985.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Jan 22 22:27:33 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:33 np0005592985.novalocal systemd-rc-local-generator[92616]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:33 np0005592985.novalocal systemd-sysv-generator[92622]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:33 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:33 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 5f2bf819-4ebf-4850-8a6b-621558a886e4 Jan 22 22:27:33 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 78c58370-c378-412d-a2c5-4922f4e84deb Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 595d59f5-c304-483a-9db3-5b555e0f7a5b Jan 22 22:27:34 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l f99f50fb-787b-428c-8044-12c9ad6fe754 Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 9e66cbee-b214-4035-9222-55d5ccdd2b17 Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal systemd-sysv-generator[92657]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:34 np0005592985.novalocal systemd-rc-local-generator[92653]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 17e0108d-3840-4dd4-9160-4b8f52602fce Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 2b448c4a-f19e-4fae-9179-c0280bc7c92a Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l fdbbbb4e-7c04-4de6-8dd6-008d3e498c20 Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 552ae4f4-3b9a-48e8-a0ec-492d16a57197 Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 16d07b9f-40c9-4cba-b457-b56b7666a406 Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 92aecd66-5f63-4f00-aab8-dc38ee297b87 Jan 22 22:27:34 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:34 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:35 np0005592985.novalocal systemd-rc-local-generator[92694]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:35 np0005592985.novalocal systemd-sysv-generator[92698]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:35 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:35 np0005592985.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Jan 22 22:27:40 np0005592985.novalocal systemd[1]: Started OpenStack Nova Compute Server. Jan 22 22:27:40 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:41 np0005592985.novalocal systemd-sysv-generator[92775]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:41 np0005592985.novalocal systemd-rc-local-generator[92770]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:41 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:41 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:41 np0005592985.novalocal systemd-rc-local-generator[92817]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:41 np0005592985.novalocal systemd-sysv-generator[92822]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:41 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:41 np0005592985.novalocal systemd[1]: Starting libvirt QEMU daemon... Jan 22 22:27:41 np0005592985.novalocal systemd[1]: Started libvirt QEMU daemon. Jan 22 22:27:41 np0005592985.novalocal nova-compute[92703]: libvirt: error : internal error: could not initialize domain event timer Jan 22 22:27:41 np0005592985.novalocal systemd[88450]: Created slice User Background Tasks Slice. Jan 22 22:27:41 np0005592985.novalocal systemd[88450]: Starting Cleanup of User's Temporary Files and Directories... Jan 22 22:27:41 np0005592985.novalocal systemd[88450]: Finished Cleanup of User's Temporary Files and Directories. Jan 22 22:27:42 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:42 np0005592985.novalocal systemd-sysv-generator[92890]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:42 np0005592985.novalocal systemd-rc-local-generator[92886]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:42 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:42 np0005592985.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Jan 22 22:27:43 np0005592985.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Jan 22 22:27:43 np0005592985.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Jan 22 22:27:43 np0005592985.novalocal systemd[1]: Starting libvirt nodedev daemon... Jan 22 22:27:43 np0005592985.novalocal systemd[1]: Started libvirt nodedev daemon. Jan 22 22:27:44 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Jan 22 22:27:44 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Jan 22 22:27:44 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.146s CPU time. Jan 22 22:27:44 np0005592985.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Jan 22 22:27:45 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:45 np0005592985.novalocal systemd-rc-local-generator[92963]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:45 np0005592985.novalocal systemd-sysv-generator[92966]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:45 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:45 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:27:45 np0005592985.novalocal systemd-rc-local-generator[92992]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:27:45 np0005592985.novalocal systemd-sysv-generator[92996]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:27:45 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 5f2bf819-4ebf-4850-8a6b-621558a886e4 Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 78c58370-c378-412d-a2c5-4922f4e84deb Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 595d59f5-c304-483a-9db3-5b555e0f7a5b Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l f99f50fb-787b-428c-8044-12c9ad6fe754 Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 9e66cbee-b214-4035-9222-55d5ccdd2b17 Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 17e0108d-3840-4dd4-9160-4b8f52602fce Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 2b448c4a-f19e-4fae-9179-c0280bc7c92a Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l fdbbbb4e-7c04-4de6-8dd6-008d3e498c20 Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 552ae4f4-3b9a-48e8-a0ec-492d16a57197 Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 16d07b9f-40c9-4cba-b457-b56b7666a406 Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 92aecd66-5f63-4f00-aab8-dc38ee297b87 Jan 22 22:27:45 np0005592985.novalocal setroubleshoot[92577]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Jan 22 22:27:55 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Jan 22 22:27:55 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.218s CPU time. Jan 22 22:27:56 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:27:56 np0005592985.novalocal systemd[1]: setroubleshootd.service: Consumed 2.200s CPU time. Jan 22 22:28:02 np0005592985.novalocal sshd-session[93011]: Received disconnect from 45.148.10.152 port 21614:11: [preauth] Jan 22 22:28:02 np0005592985.novalocal sshd-session[93011]: Disconnected from authenticating user root 45.148.10.152 port 21614 [preauth] Jan 22 22:28:02 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:28:02 np0005592985.novalocal sudo[93013]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:28:02 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:28:02 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:28:02 np0005592985.novalocal systemd[1]: Started Session c77 of User root. Jan 22 22:28:02 np0005592985.novalocal sudo[93013]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:28:03 np0005592985.novalocal sudo[93013]: pam_unix(sudo:session): session closed for user root Jan 22 22:28:03 np0005592985.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Jan 22 22:28:03 np0005592985.novalocal sudo[93018]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:28:03 np0005592985.novalocal systemd[1]: Started Session c78 of User root. Jan 22 22:28:03 np0005592985.novalocal sudo[93018]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:28:03 np0005592985.novalocal sudo[93018]: pam_unix(sudo:session): session closed for user root Jan 22 22:28:03 np0005592985.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Jan 22 22:28:03 np0005592985.novalocal sudo[93022]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:28:03 np0005592985.novalocal systemd[1]: Started Session c79 of User root. Jan 22 22:28:03 np0005592985.novalocal sudo[93022]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:28:04 np0005592985.novalocal sudo[93022]: pam_unix(sudo:session): session closed for user root Jan 22 22:28:04 np0005592985.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Jan 22 22:28:04 np0005592985.novalocal sudo[93027]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:28:04 np0005592985.novalocal systemd[1]: Started Session c80 of User root. Jan 22 22:28:04 np0005592985.novalocal sudo[93027]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:28:04 np0005592985.novalocal sudo[93027]: pam_unix(sudo:session): session closed for user root Jan 22 22:28:04 np0005592985.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Jan 22 22:28:20 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:28:21 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:28:21 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l be82466a-1fa6-4a25-8d4e-e398a2bd5346 Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 3b1d51f6-c163-487e-9ca3-8802d77c05d6 Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l f2c667fe-3217-41ad-a2f4-19dc12f21068 Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa': Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. For complete SELinux messages run: sealert -l c127d632-41aa-44ed-a793-2186cf1a718e Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:22 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. For complete SELinux messages run: sealert -l a03a08ae-96fb-4926-bb53-18eb8fdac82a Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. For complete SELinux messages run: sealert -l 3586fbf3-2c76-423d-b7f3-59e812652c68 Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l a7d9f850-94f6-4588-bf7d-ac4a4d2a59a8 Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l c2a22f40-7619-477b-ab70-5e648fee805e Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 96e83d70-409e-4843-a407-cc15d1e23897 Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from read access on the file 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. For complete SELinux messages run: sealert -l a21d58d5-5327-40c9-8762-482123b8d564 Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from read access on the file 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. For complete SELinux messages run: sealert -l 085204ea-8427-4516-810a-bcc7be0444c7 Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. For complete SELinux messages run: sealert -l a03a08ae-96fb-4926-bb53-18eb8fdac82a Jan 22 22:28:23 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:24 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. For complete SELinux messages run: sealert -l 3586fbf3-2c76-423d-b7f3-59e812652c68 Jan 22 22:28:24 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 7e1e4a560018ec4db44f256d63f0d8bdfb6ef6154df47a2f68a38e463f3ce2fa file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:28:24 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l a7d9f850-94f6-4588-bf7d-ac4a4d2a59a8 Jan 22 22:28:24 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:28:24 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l c2a22f40-7619-477b-ab70-5e648fee805e Jan 22 22:28:24 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:28:25 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 96e83d70-409e-4843-a407-cc15d1e23897 Jan 22 22:28:25 np0005592985.novalocal setroubleshoot[93041]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Jan 22 22:28:31 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:28:32 np0005592985.novalocal systemd-rc-local-generator[93096]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:28:32 np0005592985.novalocal systemd-sysv-generator[93099]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:28:32 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:28:32 np0005592985.novalocal systemd[1]: Started OpenStack Octavia Worker service. Jan 22 22:28:32 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:28:32 np0005592985.novalocal systemd-rc-local-generator[93130]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:28:32 np0005592985.novalocal systemd-sysv-generator[93133]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:28:32 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:28:33 np0005592985.novalocal systemd[1]: Reloading. Jan 22 22:28:33 np0005592985.novalocal systemd-sysv-generator[93160]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 22 22:28:33 np0005592985.novalocal systemd-rc-local-generator[93155]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 22 22:28:33 np0005592985.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Jan 22 22:28:35 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Jan 22 22:28:35 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.170s CPU time. Jan 22 22:28:35 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:28:35 np0005592985.novalocal systemd[1]: setroubleshootd.service: Consumed 1.861s CPU time. Jan 22 22:28:48 np0005592985.novalocal runuser[93377]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:28:49 np0005592985.novalocal runuser[93377]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:28:49 np0005592985.novalocal runuser[93430]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:28:50 np0005592985.novalocal runuser[93430]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:28:50 np0005592985.novalocal runuser[93484]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:28:51 np0005592985.novalocal runuser[93484]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:01 np0005592985.novalocal sshd-session[93544]: Connection closed by 154.117.199.5 port 13339 [preauth] Jan 22 22:29:02 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:29:02 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:29:02 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:29:02 np0005592985.novalocal sudo[93548]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:29:02 np0005592985.novalocal systemd[1]: Started Session c81 of User root. Jan 22 22:29:02 np0005592985.novalocal sudo[93548]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:29:03 np0005592985.novalocal sudo[93548]: pam_unix(sudo:session): session closed for user root Jan 22 22:29:03 np0005592985.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Jan 22 22:29:03 np0005592985.novalocal sudo[93552]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:29:03 np0005592985.novalocal systemd[1]: Started Session c82 of User root. Jan 22 22:29:03 np0005592985.novalocal sudo[93552]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:29:03 np0005592985.novalocal sudo[93552]: pam_unix(sudo:session): session closed for user root Jan 22 22:29:03 np0005592985.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Jan 22 22:29:03 np0005592985.novalocal sudo[93560]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:29:03 np0005592985.novalocal systemd[1]: Started Session c83 of User root. Jan 22 22:29:03 np0005592985.novalocal sudo[93560]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:29:04 np0005592985.novalocal sudo[93560]: pam_unix(sudo:session): session closed for user root Jan 22 22:29:04 np0005592985.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Jan 22 22:29:04 np0005592985.novalocal sudo[93583]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:29:04 np0005592985.novalocal systemd[1]: Started Session c84 of User root. Jan 22 22:29:04 np0005592985.novalocal sudo[93583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:29:04 np0005592985.novalocal sudo[93583]: pam_unix(sudo:session): session closed for user root Jan 22 22:29:04 np0005592985.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: Stopping Redis persistent key-value database... Jan 22 22:29:14 np0005592985.novalocal redis-shutdown[93888]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: redis.service: Deactivated successfully. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: Stopped Redis persistent key-value database. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: redis.service: Consumed 1.163s CPU time, 6.7M memory peak. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: Starting Redis persistent key-value database... Jan 22 22:29:14 np0005592985.novalocal systemd[1]: Started Redis persistent key-value database. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: Stopping Redis Sentinel... Jan 22 22:29:14 np0005592985.novalocal redis-shutdown[93914]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Jan 22 22:29:14 np0005592985.novalocal redis-shutdown[93914]: Could not connect to Redis at ::1:0: Connection refused Jan 22 22:29:14 np0005592985.novalocal systemd[1]: redis-sentinel.service: Control process exited, code=exited, status=1/FAILURE Jan 22 22:29:14 np0005592985.novalocal systemd[1]: redis-sentinel.service: Failed with result 'exit-code'. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: Stopped Redis Sentinel. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: redis-sentinel.service: Consumed 1.378s CPU time, 9.7M memory peak. Jan 22 22:29:14 np0005592985.novalocal systemd[1]: Starting Redis Sentinel... Jan 22 22:29:14 np0005592985.novalocal systemd[1]: Started Redis Sentinel. Jan 22 22:29:35 np0005592985.novalocal crontab[93982]: (root) LIST (root) Jan 22 22:29:35 np0005592985.novalocal crontab[93983]: (root) LIST (keystone) Jan 22 22:29:35 np0005592985.novalocal crontab[93984]: (root) LIST (cinder) Jan 22 22:29:35 np0005592985.novalocal crontab[93985]: (root) LIST (glance) Jan 22 22:29:35 np0005592985.novalocal crontab[93986]: (root) LIST (nova) Jan 22 22:29:35 np0005592985.novalocal crontab[93987]: (root) LIST (manila) Jan 22 22:29:39 np0005592985.novalocal runuser[94029]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:39 np0005592985.novalocal runuser[94029]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:40 np0005592985.novalocal runuser[94083]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:40 np0005592985.novalocal runuser[94083]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:40 np0005592985.novalocal runuser[94135]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:41 np0005592985.novalocal runuser[94135]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:41 np0005592985.novalocal runuser[94189]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:42 np0005592985.novalocal runuser[94189]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:42 np0005592985.novalocal runuser[94241]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:43 np0005592985.novalocal runuser[94241]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:43 np0005592985.novalocal runuser[94293]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:43 np0005592985.novalocal runuser[94293]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:44 np0005592985.novalocal runuser[94346]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:44 np0005592985.novalocal runuser[94346]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:44 np0005592985.novalocal runuser[94404]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:45 np0005592985.novalocal runuser[94404]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:45 np0005592985.novalocal runuser[94457]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:46 np0005592985.novalocal runuser[94457]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:46 np0005592985.novalocal runuser[94509]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:48 np0005592985.novalocal runuser[94509]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:49 np0005592985.novalocal runuser[94573]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:50 np0005592985.novalocal runuser[94573]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:50 np0005592985.novalocal runuser[94625]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:50 np0005592985.novalocal runuser[94625]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:51 np0005592985.novalocal runuser[94679]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:51 np0005592985.novalocal runuser[94679]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:51 np0005592985.novalocal runuser[94731]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:52 np0005592985.novalocal runuser[94731]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:53 np0005592985.novalocal runuser[94789]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:53 np0005592985.novalocal runuser[94789]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:54 np0005592985.novalocal runuser[94841]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:54 np0005592985.novalocal runuser[94841]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:56 np0005592985.novalocal virtqemud[92828]: libvirt version: 11.10.0, package: 2.el9 (builder@centos.org, 2025-12-18-15:09:54, ) Jan 22 22:29:56 np0005592985.novalocal virtqemud[92828]: hostname: np0005592985.novalocal Jan 22 22:29:56 np0005592985.novalocal virtqemud[92828]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 22:29:56 np0005592985.novalocal virtqemud[92828]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 22:29:57 np0005592985.novalocal runuser[94926]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:58 np0005592985.novalocal runuser[94926]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:58 np0005592985.novalocal runuser[94978]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:29:58 np0005592985.novalocal runuser[94978]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:29:59 np0005592985.novalocal runuser[95038]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:30:00 np0005592985.novalocal runuser[95038]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:30:00 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:30:00 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:30:00 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:30:00 np0005592985.novalocal runuser[95091]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Jan 22 22:30:01 np0005592985.novalocal runuser[95091]: pam_unix(runuser:session): session closed for user rabbitmq Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Created slice User Slice of UID 161. Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Created slice User Slice of UID 163. Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Starting User Manager for UID 161... Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Starting User Manager for UID 163... Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Queued start job for default target Main User Target. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Queued start job for default target Main User Target. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Created slice User Application Slice. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Started Daily Cleanup of User's Temporary Directories. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Reached target Paths. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Reached target Timers. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Created slice User Application Slice. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Started Daily Cleanup of User's Temporary Directories. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Reached target Paths. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Reached target Timers. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Starting D-Bus User Message Bus Socket... Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Starting D-Bus User Message Bus Socket... Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Listening on PipeWire PulseAudio. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Listening on PipeWire PulseAudio. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Listening on PipeWire Multimedia System Sockets. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Listening on PipeWire Multimedia System Sockets. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Starting Create User's Volatile Files and Directories... Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Starting Create User's Volatile Files and Directories... Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Listening on D-Bus User Message Bus Socket. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Reached target Sockets. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Listening on D-Bus User Message Bus Socket. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Reached target Sockets. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Finished Create User's Volatile Files and Directories. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Reached target Basic System. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Reached target Main User Target. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Finished Create User's Volatile Files and Directories. Jan 22 22:30:01 np0005592985.novalocal systemd[95158]: Startup finished in 192ms. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Reached target Basic System. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Reached target Main User Target. Jan 22 22:30:01 np0005592985.novalocal systemd[95156]: Startup finished in 208ms. Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Started User Manager for UID 163. Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Started User Manager for UID 161. Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Started Session 5 of User keystone. Jan 22 22:30:01 np0005592985.novalocal systemd[1]: Started Session 6 of User glance. Jan 22 22:30:01 np0005592985.novalocal CROND[95180]: (glance) CMD (glance-cache-pruner) Jan 22 22:30:01 np0005592985.novalocal CROND[95181]: (keystone) CMD (keystone-manage fernet_rotate) Jan 22 22:30:02 np0005592985.novalocal CROND[95149]: (glance) CMDOUT (2026-01-22 22:30:02.732 95180 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Jan 22 22:30:02 np0005592985.novalocal sudo[95185]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:30:02 np0005592985.novalocal systemd[1]: Started Session c85 of User root. Jan 22 22:30:02 np0005592985.novalocal sudo[95185]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:30:03 np0005592985.novalocal CROND[95149]: (glance) CMDOUT (2026-01-22 22:30:03.007 95180 DEBUG glance.image_cache [None req-6ae882ea-91c5-4366-9ec7-4b23c6d06f62 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Jan 22 22:30:03 np0005592985.novalocal CROND[95149]: (glance) CMDEND (glance-cache-pruner) Jan 22 22:30:03 np0005592985.novalocal systemd[1]: session-6.scope: Deactivated successfully. Jan 22 22:30:03 np0005592985.novalocal systemd[1]: session-6.scope: Consumed 1.181s CPU time. Jan 22 22:30:03 np0005592985.novalocal sudo[95185]: pam_unix(sudo:session): session closed for user root Jan 22 22:30:03 np0005592985.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Jan 22 22:30:03 np0005592985.novalocal sudo[95189]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:30:03 np0005592985.novalocal systemd[1]: Started Session c86 of User root. Jan 22 22:30:03 np0005592985.novalocal sudo[95189]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:30:03 np0005592985.novalocal sudo[95189]: pam_unix(sudo:session): session closed for user root Jan 22 22:30:03 np0005592985.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Jan 22 22:30:03 np0005592985.novalocal sudo[95193]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:30:03 np0005592985.novalocal systemd[1]: Started Session c87 of User root. Jan 22 22:30:03 np0005592985.novalocal sudo[95193]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:30:03 np0005592985.novalocal CROND[95150]: (keystone) CMDEND (keystone-manage fernet_rotate) Jan 22 22:30:03 np0005592985.novalocal systemd[1]: session-5.scope: Deactivated successfully. Jan 22 22:30:03 np0005592985.novalocal systemd[1]: session-5.scope: Consumed 1.873s CPU time. Jan 22 22:30:04 np0005592985.novalocal sudo[95193]: pam_unix(sudo:session): session closed for user root Jan 22 22:30:04 np0005592985.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Jan 22 22:30:04 np0005592985.novalocal sudo[95199]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:30:04 np0005592985.novalocal systemd[1]: Started Session c88 of User root. Jan 22 22:30:04 np0005592985.novalocal sudo[95199]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:30:04 np0005592985.novalocal sudo[95199]: pam_unix(sudo:session): session closed for user root Jan 22 22:30:04 np0005592985.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Jan 22 22:30:13 np0005592985.novalocal systemd[1]: Stopping User Manager for UID 161... Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Activating special unit Exit the Session... Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Stopped target Main User Target. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Stopped target Basic System. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Stopped target Paths. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Stopped target Sockets. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Stopped target Timers. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Stopped Daily Cleanup of User's Temporary Directories. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Closed D-Bus User Message Bus Socket. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Closed PipeWire PulseAudio. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Closed PipeWire Multimedia System Sockets. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Stopped Create User's Volatile Files and Directories. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Removed slice User Application Slice. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Reached target Shutdown. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Finished Exit the Session. Jan 22 22:30:13 np0005592985.novalocal systemd[95156]: Reached target Exit the Session. Jan 22 22:30:13 np0005592985.novalocal systemd[1]: user@161.service: Deactivated successfully. Jan 22 22:30:13 np0005592985.novalocal systemd[1]: Stopped User Manager for UID 161. Jan 22 22:30:13 np0005592985.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Jan 22 22:30:13 np0005592985.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Jan 22 22:30:13 np0005592985.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Jan 22 22:30:13 np0005592985.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Jan 22 22:30:13 np0005592985.novalocal systemd[1]: Removed slice User Slice of UID 161. Jan 22 22:30:13 np0005592985.novalocal systemd[1]: user-161.slice: Consumed 1.448s CPU time. Jan 22 22:30:14 np0005592985.novalocal systemd[1]: Stopping User Manager for UID 163... Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Activating special unit Exit the Session... Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Stopped target Main User Target. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Stopped target Basic System. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Stopped target Paths. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Stopped target Sockets. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Stopped target Timers. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Stopped Daily Cleanup of User's Temporary Directories. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Closed D-Bus User Message Bus Socket. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Closed PipeWire PulseAudio. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Closed PipeWire Multimedia System Sockets. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Stopped Create User's Volatile Files and Directories. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Removed slice User Application Slice. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Reached target Shutdown. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Finished Exit the Session. Jan 22 22:30:14 np0005592985.novalocal systemd[95158]: Reached target Exit the Session. Jan 22 22:30:14 np0005592985.novalocal systemd[1]: user@163.service: Deactivated successfully. Jan 22 22:30:14 np0005592985.novalocal systemd[1]: Stopped User Manager for UID 163. Jan 22 22:30:14 np0005592985.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Jan 22 22:30:14 np0005592985.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Jan 22 22:30:14 np0005592985.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Jan 22 22:30:14 np0005592985.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Jan 22 22:30:14 np0005592985.novalocal systemd[1]: Removed slice User Slice of UID 163. Jan 22 22:30:14 np0005592985.novalocal systemd[1]: user-163.slice: Consumed 2.166s CPU time. Jan 22 22:31:02 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:31:02 np0005592985.novalocal sudo[95292]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:31:02 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:31:02 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:31:02 np0005592985.novalocal systemd[1]: Started Session c89 of User root. Jan 22 22:31:02 np0005592985.novalocal sudo[95292]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:31:03 np0005592985.novalocal sudo[95292]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:03 np0005592985.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Jan 22 22:31:03 np0005592985.novalocal sudo[95298]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:31:03 np0005592985.novalocal systemd[1]: Started Session c90 of User root. Jan 22 22:31:03 np0005592985.novalocal sudo[95298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:31:03 np0005592985.novalocal sudo[95298]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:03 np0005592985.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Jan 22 22:31:03 np0005592985.novalocal sudo[95302]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:31:03 np0005592985.novalocal systemd[1]: Started Session c91 of User root. Jan 22 22:31:03 np0005592985.novalocal sudo[95302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:31:04 np0005592985.novalocal sudo[95302]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:04 np0005592985.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Jan 22 22:31:04 np0005592985.novalocal sudo[95306]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:31:04 np0005592985.novalocal systemd[1]: Started Session c92 of User root. Jan 22 22:31:04 np0005592985.novalocal sudo[95306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:31:04 np0005592985.novalocal sudo[95306]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:04 np0005592985.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Jan 22 22:31:40 np0005592985.novalocal sudo[54413]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:41 np0005592985.novalocal sudo[95966]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ckeqhkvyfsbbwrzrvplxhzxdkgegjhdz ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Jan 22 22:31:41 np0005592985.novalocal sudo[95966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:31:41 np0005592985.novalocal python3[95968]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Jan 22 22:31:41 np0005592985.novalocal sudo[96091]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Jan 22 22:31:41 np0005592985.novalocal sudo[96091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:41 np0005592985.novalocal sudo[96091]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:41 np0005592985.novalocal sudo[96094]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Jan 22 22:31:41 np0005592985.novalocal sudo[96094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:41 np0005592985.novalocal sudo[96094]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:41 np0005592985.novalocal sudo[96097]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Jan 22 22:31:41 np0005592985.novalocal sudo[96097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:41 np0005592985.novalocal sudo[96097]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96100]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96100]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96103]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96103]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96106]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96106]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96109]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96109]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96112]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96112]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96115]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96115]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96118]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96118]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96121]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96121]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96124]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96124]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96127]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96127]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96130]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96130]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96133]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96133]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96136]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96136]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96139]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96139]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96142]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96142]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96145]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96145]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96148]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Jan 22 22:31:42 np0005592985.novalocal sudo[96148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96148]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96151]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Jan 22 22:31:42 np0005592985.novalocal sudo[96151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96151]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Jan 22 22:31:42 np0005592985.novalocal sudo[96154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96154]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:42 np0005592985.novalocal sudo[96158]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Jan 22 22:31:42 np0005592985.novalocal sudo[96158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:42 np0005592985.novalocal sudo[96158]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96161]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Jan 22 22:31:43 np0005592985.novalocal sudo[96161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96161]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96164]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Jan 22 22:31:43 np0005592985.novalocal sudo[96164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96164]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96167]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Jan 22 22:31:43 np0005592985.novalocal sudo[96167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96167]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96170]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Jan 22 22:31:43 np0005592985.novalocal sudo[96170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96170]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96173]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Jan 22 22:31:43 np0005592985.novalocal sudo[96173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96173]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96176]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Jan 22 22:31:43 np0005592985.novalocal sudo[96176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96176]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96179]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Jan 22 22:31:43 np0005592985.novalocal sudo[96179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96179]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96182]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Jan 22 22:31:43 np0005592985.novalocal sudo[96182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96182]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96185]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Jan 22 22:31:43 np0005592985.novalocal sudo[96185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96185]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96188]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Jan 22 22:31:43 np0005592985.novalocal sudo[96188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96188]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96191]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Jan 22 22:31:43 np0005592985.novalocal sudo[96191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96191]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96194]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Jan 22 22:31:43 np0005592985.novalocal sudo[96194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96194]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96197]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Jan 22 22:31:43 np0005592985.novalocal sudo[96197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96197]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96200]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Jan 22 22:31:43 np0005592985.novalocal sudo[96200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal virtqemud[92828]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Jan 22 22:31:43 np0005592985.novalocal sudo[96200]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96204]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Jan 22 22:31:43 np0005592985.novalocal sudo[96204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96204]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96207]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Jan 22 22:31:43 np0005592985.novalocal sudo[96207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96207]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Jan 22 22:31:43 np0005592985.novalocal sudo[96210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96210]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Jan 22 22:31:43 np0005592985.novalocal sudo[96213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96213]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96217]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Jan 22 22:31:43 np0005592985.novalocal sudo[96217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96217]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96220]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Jan 22 22:31:43 np0005592985.novalocal sudo[96220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96220]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Jan 22 22:31:43 np0005592985.novalocal sudo[96223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96223]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Jan 22 22:31:43 np0005592985.novalocal sudo[96226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:43 np0005592985.novalocal sudo[96226]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:43 np0005592985.novalocal sudo[96229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Jan 22 22:31:44 np0005592985.novalocal sudo[96229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96229]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Jan 22 22:31:44 np0005592985.novalocal sudo[96232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96232]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96235]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Jan 22 22:31:44 np0005592985.novalocal sudo[96235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96235]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96238]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Jan 22 22:31:44 np0005592985.novalocal sudo[96238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96238]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Jan 22 22:31:44 np0005592985.novalocal sudo[96241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96241]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96244]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96248]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Jan 22 22:31:44 np0005592985.novalocal sudo[96248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96248]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Jan 22 22:31:44 np0005592985.novalocal sudo[96252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96252]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Jan 22 22:31:44 np0005592985.novalocal sudo[96256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96256]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Jan 22 22:31:44 np0005592985.novalocal sudo[96259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96259]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Jan 22 22:31:44 np0005592985.novalocal sudo[96262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96262]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Jan 22 22:31:44 np0005592985.novalocal sudo[96265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96265]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96268]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Jan 22 22:31:44 np0005592985.novalocal sudo[96271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96271]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96274]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Jan 22 22:31:44 np0005592985.novalocal sudo[96277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96277]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96281]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96281]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96284]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96284]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96289]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96289]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96292]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96292]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96296]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96299]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96299]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96302]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96305]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96305]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96308]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96308]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96311]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96311]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:44 np0005592985.novalocal sudo[96314]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Jan 22 22:31:44 np0005592985.novalocal sudo[96314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:44 np0005592985.novalocal sudo[96314]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:45 np0005592985.novalocal sudo[96317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Jan 22 22:31:45 np0005592985.novalocal sudo[96317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:45 np0005592985.novalocal sudo[96317]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:45 np0005592985.novalocal sudo[96321]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Jan 22 22:31:45 np0005592985.novalocal sudo[96321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:45 np0005592985.novalocal sudo[96321]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:45 np0005592985.novalocal sudo[96328]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Jan 22 22:31:45 np0005592985.novalocal sudo[96328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:47 np0005592985.novalocal sudo[96328]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:47 np0005592985.novalocal sudo[96331]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Jan 22 22:31:47 np0005592985.novalocal sudo[96331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:48 np0005592985.novalocal sudo[96331]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:48 np0005592985.novalocal sudo[96334]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Jan 22 22:31:48 np0005592985.novalocal sudo[96334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96334]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96337]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Jan 22 22:31:49 np0005592985.novalocal sudo[96337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96337]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Jan 22 22:31:49 np0005592985.novalocal sudo[96341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96341]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Jan 22 22:31:49 np0005592985.novalocal sudo[96344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96344]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Jan 22 22:31:49 np0005592985.novalocal sudo[96350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96350]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Jan 22 22:31:49 np0005592985.novalocal sudo[96353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96353]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Jan 22 22:31:49 np0005592985.novalocal sudo[96356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96356]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Jan 22 22:31:49 np0005592985.novalocal sudo[96359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96359]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96366]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Jan 22 22:31:49 np0005592985.novalocal sudo[96366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96366]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96369]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Jan 22 22:31:49 np0005592985.novalocal sudo[96369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96369]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96375]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Jan 22 22:31:49 np0005592985.novalocal sudo[96375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96375]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96378]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Jan 22 22:31:49 np0005592985.novalocal sudo[96378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96378]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:49 np0005592985.novalocal sudo[96382]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Jan 22 22:31:49 np0005592985.novalocal sudo[96382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:49 np0005592985.novalocal sudo[96382]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:50 np0005592985.novalocal sudo[96386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Jan 22 22:31:50 np0005592985.novalocal sudo[96386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:50 np0005592985.novalocal sudo[96386]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:50 np0005592985.novalocal sudo[96389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Jan 22 22:31:50 np0005592985.novalocal sudo[96389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:50 np0005592985.novalocal sudo[96389]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:50 np0005592985.novalocal sudo[96392]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Jan 22 22:31:50 np0005592985.novalocal sudo[96392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:52 np0005592985.novalocal sudo[96392]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:52 np0005592985.novalocal sudo[96395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Jan 22 22:31:52 np0005592985.novalocal sudo[96395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:52 np0005592985.novalocal sudo[96395]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:52 np0005592985.novalocal sudo[96398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Jan 22 22:31:52 np0005592985.novalocal sudo[96398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:52 np0005592985.novalocal sudo[96398]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:52 np0005592985.novalocal sudo[96401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Jan 22 22:31:52 np0005592985.novalocal sudo[96401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:52 np0005592985.novalocal sudo[96401]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:52 np0005592985.novalocal sudo[96404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Jan 22 22:31:52 np0005592985.novalocal sudo[96404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:52 np0005592985.novalocal sudo[96404]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:52 np0005592985.novalocal sudo[96407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Jan 22 22:31:52 np0005592985.novalocal sudo[96407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:52 np0005592985.novalocal sudo[96407]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:52 np0005592985.novalocal sudo[96410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Jan 22 22:31:52 np0005592985.novalocal sudo[96410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:52 np0005592985.novalocal sudo[96410]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:52 np0005592985.novalocal sudo[96413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Jan 22 22:31:52 np0005592985.novalocal sudo[96413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:52 np0005592985.novalocal sudo[96413]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:53 np0005592985.novalocal sudo[96416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Jan 22 22:31:53 np0005592985.novalocal sudo[96416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:53 np0005592985.novalocal sudo[96416]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:53 np0005592985.novalocal sudo[96419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Jan 22 22:31:53 np0005592985.novalocal sudo[96419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:53 np0005592985.novalocal sudo[96419]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:53 np0005592985.novalocal sudo[96422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Jan 22 22:31:53 np0005592985.novalocal sudo[96422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:53 np0005592985.novalocal sudo[96422]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:53 np0005592985.novalocal sudo[96426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Jan 22 22:31:53 np0005592985.novalocal sudo[96426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:31:53 np0005592985.novalocal sudo[96426]: pam_unix(sudo:session): session closed for user root Jan 22 22:31:57 np0005592985.novalocal sudo[96434]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Jan 22 22:31:57 np0005592985.novalocal sudo[96434]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Jan 22 22:32:00 np0005592985.novalocal sudo[96434]: pam_unix(sudo:session): session closed for user nova Jan 22 22:32:00 np0005592985.novalocal systemd[1]: Starting system activity accounting tool... Jan 22 22:32:00 np0005592985.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Jan 22 22:32:00 np0005592985.novalocal systemd[1]: Finished system activity accounting tool. Jan 22 22:32:00 np0005592985.novalocal sudo[96438]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Jan 22 22:32:00 np0005592985.novalocal sudo[96438]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Jan 22 22:32:02 np0005592985.novalocal sudo[96438]: pam_unix(sudo:session): session closed for user nova Jan 22 22:32:02 np0005592985.novalocal sudo[96444]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Jan 22 22:32:02 np0005592985.novalocal systemd[1]: Started Session c93 of User root. Jan 22 22:32:02 np0005592985.novalocal sudo[96444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:32:03 np0005592985.novalocal sudo[96444]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:03 np0005592985.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Jan 22 22:32:03 np0005592985.novalocal sudo[96452]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:32:03 np0005592985.novalocal systemd[1]: Started Session c94 of User root. Jan 22 22:32:03 np0005592985.novalocal sudo[96452]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:32:03 np0005592985.novalocal sudo[96452]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:03 np0005592985.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Jan 22 22:32:03 np0005592985.novalocal sudo[96456]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Jan 22 22:32:03 np0005592985.novalocal systemd[1]: Started Session c95 of User root. Jan 22 22:32:03 np0005592985.novalocal sudo[96456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:32:03 np0005592985.novalocal sudo[96456]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:03 np0005592985.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Jan 22 22:32:04 np0005592985.novalocal sudo[96460]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Jan 22 22:32:04 np0005592985.novalocal systemd[1]: Started Session c96 of User root. Jan 22 22:32:04 np0005592985.novalocal sudo[96460]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Jan 22 22:32:04 np0005592985.novalocal sudo[96460]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:04 np0005592985.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Jan 22 22:32:22 np0005592985.novalocal sudo[96483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Jan 22 22:32:22 np0005592985.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 22 22:32:22 np0005592985.novalocal sudo[96483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96487]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Jan 22 22:32:22 np0005592985.novalocal sudo[96487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96487]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96490]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Jan 22 22:32:22 np0005592985.novalocal sudo[96490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96490]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96493]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Jan 22 22:32:22 np0005592985.novalocal sudo[96493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96493]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96496]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Jan 22 22:32:22 np0005592985.novalocal sudo[96496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96496]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96499]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Jan 22 22:32:22 np0005592985.novalocal sudo[96499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96499]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96502]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Jan 22 22:32:22 np0005592985.novalocal sudo[96502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96502]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96505]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Jan 22 22:32:22 np0005592985.novalocal sudo[96505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96505]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96508]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Jan 22 22:32:22 np0005592985.novalocal sudo[96508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96508]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96511]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:22 np0005592985.novalocal sudo[96511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96511]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:22 np0005592985.novalocal sudo[96514]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:22 np0005592985.novalocal sudo[96514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:22 np0005592985.novalocal sudo[96514]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96517]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Jan 22 22:32:23 np0005592985.novalocal sudo[96517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96517]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96520]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Jan 22 22:32:23 np0005592985.novalocal sudo[96520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96520]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96523]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:23 np0005592985.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 22 22:32:23 np0005592985.novalocal sudo[96523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96523]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96526]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:23 np0005592985.novalocal sudo[96526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96526]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96529]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Jan 22 22:32:23 np0005592985.novalocal sudo[96529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96529]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96532]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Jan 22 22:32:23 np0005592985.novalocal sudo[96532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96532]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96535]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Jan 22 22:32:23 np0005592985.novalocal sudo[96535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96535]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96538]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Jan 22 22:32:23 np0005592985.novalocal sudo[96538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96538]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96541]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Jan 22 22:32:23 np0005592985.novalocal sudo[96541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96541]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96544]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:23 np0005592985.novalocal sudo[96544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96544]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96547]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:23 np0005592985.novalocal sudo[96547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96547]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96551]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Jan 22 22:32:23 np0005592985.novalocal sudo[96551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96551]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96556]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:23 np0005592985.novalocal sudo[96556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96556]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96559]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:23 np0005592985.novalocal sudo[96559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96559]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96563]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Jan 22 22:32:23 np0005592985.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Jan 22 22:32:23 np0005592985.novalocal sudo[96563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96563]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96571]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Jan 22 22:32:23 np0005592985.novalocal sudo[96571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96571]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96574]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Jan 22 22:32:23 np0005592985.novalocal sudo[96574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96574]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96577]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Jan 22 22:32:23 np0005592985.novalocal sudo[96577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96577]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96580]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Jan 22 22:32:23 np0005592985.novalocal sudo[96580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96580]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96583]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Jan 22 22:32:23 np0005592985.novalocal sudo[96583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96583]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96586]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-linuxbridge-cleanup Jan 22 22:32:23 np0005592985.novalocal sudo[96586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96586]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96589]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Jan 22 22:32:23 np0005592985.novalocal sudo[96589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96589]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96592]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Jan 22 22:32:23 np0005592985.novalocal sudo[96592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96592]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96595]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Jan 22 22:32:23 np0005592985.novalocal sudo[96595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96595]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:23 np0005592985.novalocal sudo[96598]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Jan 22 22:32:23 np0005592985.novalocal sudo[96598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:23 np0005592985.novalocal sudo[96598]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96601]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Jan 22 22:32:24 np0005592985.novalocal sudo[96601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96601]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96604]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Jan 22 22:32:24 np0005592985.novalocal sudo[96604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96604]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96609]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Jan 22 22:32:24 np0005592985.novalocal sudo[96609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96609]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96612]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Jan 22 22:32:24 np0005592985.novalocal sudo[96612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96612]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96615]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:24 np0005592985.novalocal sudo[96615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96615]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96618]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:24 np0005592985.novalocal sudo[96618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96618]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96621]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Jan 22 22:32:24 np0005592985.novalocal sudo[96621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96621]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96624]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Jan 22 22:32:24 np0005592985.novalocal sudo[96624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96624]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96627]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:24 np0005592985.novalocal sudo[96627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96627]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96630]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:24 np0005592985.novalocal sudo[96630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96630]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96633]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Jan 22 22:32:24 np0005592985.novalocal sudo[96633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96633]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96636]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Jan 22 22:32:24 np0005592985.novalocal sudo[96636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96636]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96639]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:24 np0005592985.novalocal sudo[96639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96639]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96642]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:24 np0005592985.novalocal sudo[96642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96642]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96645]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Jan 22 22:32:24 np0005592985.novalocal sudo[96645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96645]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96648]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Jan 22 22:32:24 np0005592985.novalocal sudo[96648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96648]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96651]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Jan 22 22:32:24 np0005592985.novalocal sudo[96651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96651]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96654]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Jan 22 22:32:24 np0005592985.novalocal sudo[96654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96654]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96657]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Jan 22 22:32:24 np0005592985.novalocal sudo[96657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96657]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96660]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Jan 22 22:32:24 np0005592985.novalocal sudo[96660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96660]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96664]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Jan 22 22:32:24 np0005592985.novalocal sudo[96664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96664]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal setroubleshoot[96485]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 49747ef5-6ac2-4e91-bcfc-83c0208d98e4 Jan 22 22:32:24 np0005592985.novalocal setroubleshoot[96485]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Jan 22 22:32:24 np0005592985.novalocal sudo[96667]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Jan 22 22:32:24 np0005592985.novalocal sudo[96667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96667]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96672]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Jan 22 22:32:24 np0005592985.novalocal sudo[96672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96672]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96675]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:24 np0005592985.novalocal sudo[96675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96675]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96678]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:24 np0005592985.novalocal sudo[96678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96678]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96681]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Jan 22 22:32:24 np0005592985.novalocal sudo[96681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96681]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96684]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Jan 22 22:32:24 np0005592985.novalocal sudo[96684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96684]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96687]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Jan 22 22:32:24 np0005592985.novalocal sudo[96687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:24 np0005592985.novalocal sudo[96687]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:24 np0005592985.novalocal sudo[96690]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:25 np0005592985.novalocal sudo[96690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96690]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96693]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:25 np0005592985.novalocal sudo[96693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96693]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96696]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Jan 22 22:32:25 np0005592985.novalocal sudo[96696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96696]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96699]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Jan 22 22:32:25 np0005592985.novalocal sudo[96699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96699]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96702]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Jan 22 22:32:25 np0005592985.novalocal sudo[96702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96702]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96705]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Jan 22 22:32:25 np0005592985.novalocal sudo[96705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96705]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96708]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Jan 22 22:32:25 np0005592985.novalocal sudo[96708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96708]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96711]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Jan 22 22:32:25 np0005592985.novalocal sudo[96711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96711]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96714]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Jan 22 22:32:25 np0005592985.novalocal sudo[96714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96714]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96717]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Jan 22 22:32:25 np0005592985.novalocal sudo[96717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96717]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96720]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Jan 22 22:32:25 np0005592985.novalocal sudo[96720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96720]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96723]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Jan 22 22:32:25 np0005592985.novalocal sudo[96723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96723]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96726]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Jan 22 22:32:25 np0005592985.novalocal sudo[96726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96726]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96729]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Jan 22 22:32:25 np0005592985.novalocal sudo[96729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96729]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96732]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Jan 22 22:32:25 np0005592985.novalocal sudo[96732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96732]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96735]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Jan 22 22:32:25 np0005592985.novalocal sudo[96735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96735]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96738]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Jan 22 22:32:25 np0005592985.novalocal sudo[96738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96738]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96741]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Jan 22 22:32:25 np0005592985.novalocal sudo[96741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96741]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96744]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Jan 22 22:32:25 np0005592985.novalocal sudo[96744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96744]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96747]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Jan 22 22:32:25 np0005592985.novalocal sudo[96747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96747]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96750]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:25 np0005592985.novalocal sudo[96750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96750]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96753]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Jan 22 22:32:25 np0005592985.novalocal sudo[96753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96753]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96756]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Jan 22 22:32:25 np0005592985.novalocal sudo[96756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96756]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96759]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Jan 22 22:32:25 np0005592985.novalocal sudo[96759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96759]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96762]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Jan 22 22:32:25 np0005592985.novalocal sudo[96762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96762]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96765]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Jan 22 22:32:25 np0005592985.novalocal sudo[96765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96765]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96768]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Jan 22 22:32:25 np0005592985.novalocal sudo[96768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96768]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96771]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Jan 22 22:32:25 np0005592985.novalocal sudo[96771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96771]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96774]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Jan 22 22:32:25 np0005592985.novalocal sudo[96774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96774]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96777]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Jan 22 22:32:25 np0005592985.novalocal sudo[96777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96777]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96780]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Jan 22 22:32:25 np0005592985.novalocal sudo[96780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96780]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96783]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Jan 22 22:32:25 np0005592985.novalocal sudo[96783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96783]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96786]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Jan 22 22:32:25 np0005592985.novalocal sudo[96786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96786]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96789]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Jan 22 22:32:25 np0005592985.novalocal sudo[96789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96789]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:25 np0005592985.novalocal sudo[96792]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Jan 22 22:32:25 np0005592985.novalocal sudo[96792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:25 np0005592985.novalocal sudo[96792]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96795]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Jan 22 22:32:26 np0005592985.novalocal sudo[96795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96795]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96798]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Jan 22 22:32:26 np0005592985.novalocal sudo[96798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96798]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96801]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Jan 22 22:32:26 np0005592985.novalocal sudo[96801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96801]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96804]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Jan 22 22:32:26 np0005592985.novalocal sudo[96804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96804]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96807]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Jan 22 22:32:26 np0005592985.novalocal sudo[96807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96807]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96810]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Jan 22 22:32:26 np0005592985.novalocal sudo[96810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96810]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96813]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Jan 22 22:32:26 np0005592985.novalocal sudo[96813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96813]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96816]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Jan 22 22:32:26 np0005592985.novalocal sudo[96816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96816]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96819]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Jan 22 22:32:26 np0005592985.novalocal sudo[96819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96819]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96822]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Jan 22 22:32:26 np0005592985.novalocal sudo[96822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96822]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96825]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Jan 22 22:32:26 np0005592985.novalocal sudo[96825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96825]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96828]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Jan 22 22:32:26 np0005592985.novalocal sudo[96828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96828]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96831]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Jan 22 22:32:26 np0005592985.novalocal sudo[96831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96831]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96834]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Jan 22 22:32:26 np0005592985.novalocal sudo[96834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96834]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96837]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Jan 22 22:32:26 np0005592985.novalocal sudo[96837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96837]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96840]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Jan 22 22:32:26 np0005592985.novalocal sudo[96840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96840]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96843]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Jan 22 22:32:26 np0005592985.novalocal sudo[96843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96843]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96483]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96846]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Jan 22 22:32:26 np0005592985.novalocal sudo[96846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96849]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260122_222841.log Jan 22 22:32:26 np0005592985.novalocal sudo[96849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96849]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96852]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.log Jan 22 22:32:26 np0005592985.novalocal sudo[96852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96852]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96855]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Jan 22 22:32:26 np0005592985.novalocal sudo[96855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96855]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96858]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Jan 22 22:32:26 np0005592985.novalocal sudo[96858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96858]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96861]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Jan 22 22:32:26 np0005592985.novalocal sudo[96861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96861]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96864]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Jan 22 22:32:26 np0005592985.novalocal sudo[96864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96864]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96867]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Jan 22 22:32:26 np0005592985.novalocal sudo[96867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96867]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96870]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Jan 22 22:32:26 np0005592985.novalocal sudo[96870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96870]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:26 np0005592985.novalocal sudo[96873]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Jan 22 22:32:26 np0005592985.novalocal sudo[96873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:26 np0005592985.novalocal sudo[96873]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96876]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Jan 22 22:32:27 np0005592985.novalocal sudo[96876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96876]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96879]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Jan 22 22:32:27 np0005592985.novalocal sudo[96879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96879]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96882]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Jan 22 22:32:27 np0005592985.novalocal sudo[96882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96882]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96885]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Jan 22 22:32:27 np0005592985.novalocal sudo[96885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96885]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96888]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Jan 22 22:32:27 np0005592985.novalocal sudo[96888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96888]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96891]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Jan 22 22:32:27 np0005592985.novalocal sudo[96891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96891]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96894]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Jan 22 22:32:27 np0005592985.novalocal sudo[96894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96894]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96897]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Jan 22 22:32:27 np0005592985.novalocal sudo[96897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96897]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96900]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Jan 22 22:32:27 np0005592985.novalocal sudo[96900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96900]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96903]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Jan 22 22:32:27 np0005592985.novalocal sudo[96903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96903]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96906]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Jan 22 22:32:27 np0005592985.novalocal sudo[96906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96906]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96909]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Jan 22 22:32:27 np0005592985.novalocal sudo[96909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96909]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96912]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Jan 22 22:32:27 np0005592985.novalocal sudo[96912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96912]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96915]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Jan 22 22:32:27 np0005592985.novalocal sudo[96915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96915]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96918]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Jan 22 22:32:27 np0005592985.novalocal sudo[96918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96918]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96921]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Jan 22 22:32:27 np0005592985.novalocal sudo[96921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96921]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96924]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Jan 22 22:32:27 np0005592985.novalocal sudo[96924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96924]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96927]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Jan 22 22:32:27 np0005592985.novalocal sudo[96927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96927]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96930]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Jan 22 22:32:27 np0005592985.novalocal sudo[96930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96930]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96933]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Jan 22 22:32:27 np0005592985.novalocal sudo[96933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96933]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96936]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Jan 22 22:32:27 np0005592985.novalocal sudo[96936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96936]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96939]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Jan 22 22:32:27 np0005592985.novalocal sudo[96939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96939]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96942]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 22:32:27 np0005592985.novalocal sudo[96942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96942]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96945]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 22:32:27 np0005592985.novalocal sudo[96945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96945]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96948]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:27 np0005592985.novalocal sudo[96948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96948]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96951]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:27 np0005592985.novalocal sudo[96951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96951]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96954]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Jan 22 22:32:27 np0005592985.novalocal sudo[96954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96954]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96957]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Jan 22 22:32:27 np0005592985.novalocal sudo[96957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96957]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:27 np0005592985.novalocal sudo[96960]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Jan 22 22:32:27 np0005592985.novalocal sudo[96960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:27 np0005592985.novalocal sudo[96960]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96963]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Jan 22 22:32:28 np0005592985.novalocal sudo[96963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96963]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96966]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Jan 22 22:32:28 np0005592985.novalocal sudo[96966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96966]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96969]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Jan 22 22:32:28 np0005592985.novalocal sudo[96969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96969]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96972]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 22:32:28 np0005592985.novalocal sudo[96972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96972]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96975]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Jan 22 22:32:28 np0005592985.novalocal sudo[96975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96975]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96978]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 22:32:28 np0005592985.novalocal sudo[96978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96978]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96981]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Jan 22 22:32:28 np0005592985.novalocal sudo[96981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96981]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96984]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Jan 22 22:32:28 np0005592985.novalocal sudo[96984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96984]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96987]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Jan 22 22:32:28 np0005592985.novalocal sudo[96987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96987]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96990]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Jan 22 22:32:28 np0005592985.novalocal sudo[96990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96990]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96993]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Jan 22 22:32:28 np0005592985.novalocal sudo[96993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96993]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96996]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Jan 22 22:32:28 np0005592985.novalocal sudo[96996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96996]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[96999]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Jan 22 22:32:28 np0005592985.novalocal sudo[96999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[96999]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97002]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Jan 22 22:32:28 np0005592985.novalocal sudo[97002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97002]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97005]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Jan 22 22:32:28 np0005592985.novalocal sudo[97005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97005]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97008]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Jan 22 22:32:28 np0005592985.novalocal sudo[97008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97008]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97011]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Jan 22 22:32:28 np0005592985.novalocal sudo[97011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97011]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97014]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Jan 22 22:32:28 np0005592985.novalocal sudo[97014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97014]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97017]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Jan 22 22:32:28 np0005592985.novalocal sudo[97017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97017]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97020]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Jan 22 22:32:28 np0005592985.novalocal sudo[97020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97020]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97023]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Jan 22 22:32:28 np0005592985.novalocal sudo[97023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97023]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97026]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Jan 22 22:32:28 np0005592985.novalocal sudo[97026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97026]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97029]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Jan 22 22:32:28 np0005592985.novalocal sudo[97029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97029]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97032]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Jan 22 22:32:28 np0005592985.novalocal sudo[97032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97032]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:28 np0005592985.novalocal sudo[97035]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Jan 22 22:32:28 np0005592985.novalocal sudo[97035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:28 np0005592985.novalocal sudo[97035]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97038]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Jan 22 22:32:29 np0005592985.novalocal sudo[97038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97038]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97041]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Jan 22 22:32:29 np0005592985.novalocal sudo[97041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97041]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97044]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Jan 22 22:32:29 np0005592985.novalocal sudo[97044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97044]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97047]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Jan 22 22:32:29 np0005592985.novalocal sudo[97047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97047]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97050]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Jan 22 22:32:29 np0005592985.novalocal sudo[97050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97050]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97053]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Jan 22 22:32:29 np0005592985.novalocal sudo[97053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97053]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97056]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Jan 22 22:32:29 np0005592985.novalocal sudo[97056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97056]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97059]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Jan 22 22:32:29 np0005592985.novalocal sudo[97059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97059]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97062]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Jan 22 22:32:29 np0005592985.novalocal sudo[97062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97062]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97065]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Jan 22 22:32:29 np0005592985.novalocal sudo[97065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97065]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97068]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Jan 22 22:32:29 np0005592985.novalocal sudo[97068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97068]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97071]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Jan 22 22:32:29 np0005592985.novalocal sudo[97071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97071]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97074]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Jan 22 22:32:29 np0005592985.novalocal sudo[97074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97074]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97077]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Jan 22 22:32:29 np0005592985.novalocal sudo[97077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97077]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97080]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Jan 22 22:32:29 np0005592985.novalocal sudo[97080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97080]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97083]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Jan 22 22:32:29 np0005592985.novalocal sudo[97083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97083]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97086]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Jan 22 22:32:29 np0005592985.novalocal sudo[97086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97086]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97089]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Jan 22 22:32:29 np0005592985.novalocal sudo[97089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97089]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97092]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Jan 22 22:32:29 np0005592985.novalocal sudo[97092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97092]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97095]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./default_catalog.templates Jan 22 22:32:29 np0005592985.novalocal sudo[97095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97095]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97098]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Jan 22 22:32:29 np0005592985.novalocal sudo[97098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97098]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97101]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Jan 22 22:32:29 np0005592985.novalocal sudo[97101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97101]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97104]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Jan 22 22:32:29 np0005592985.novalocal sudo[97104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97104]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97107]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 22:32:29 np0005592985.novalocal sudo[97107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97107]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97110]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:29 np0005592985.novalocal sudo[97110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:29 np0005592985.novalocal sudo[97110]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:29 np0005592985.novalocal sudo[97113]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:30 np0005592985.novalocal sudo[97113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97113]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97116]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97116]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97119]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Jan 22 22:32:30 np0005592985.novalocal sudo[97119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97119]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97122]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 22:32:30 np0005592985.novalocal sudo[97122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97122]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97125]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 22:32:30 np0005592985.novalocal sudo[97125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97125]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97128]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Jan 22 22:32:30 np0005592985.novalocal sudo[97128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97128]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97131]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Jan 22 22:32:30 np0005592985.novalocal sudo[97131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97131]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97134]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 22:32:30 np0005592985.novalocal sudo[97134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97134]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97137]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97137]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97140]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97140]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97143]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97143]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97146]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97146]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97149]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97149]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97152]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Jan 22 22:32:30 np0005592985.novalocal sudo[97152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97152]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97155]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97155]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97158]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Jan 22 22:32:30 np0005592985.novalocal sudo[97158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97158]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97161]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Jan 22 22:32:30 np0005592985.novalocal sudo[97161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97161]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97164]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Jan 22 22:32:30 np0005592985.novalocal sudo[97164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97164]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97167]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Jan 22 22:32:30 np0005592985.novalocal sudo[97167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97167]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97170]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Jan 22 22:32:30 np0005592985.novalocal sudo[97170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97170]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97173]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 22:32:30 np0005592985.novalocal sudo[97173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97173]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97176]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97176]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97179]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97179]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97182]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Jan 22 22:32:30 np0005592985.novalocal sudo[97182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97182]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97185]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:30 np0005592985.novalocal sudo[97185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97185]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:30 np0005592985.novalocal sudo[97188]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:30 np0005592985.novalocal sudo[97188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:30 np0005592985.novalocal sudo[97188]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97191]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Jan 22 22:32:31 np0005592985.novalocal sudo[97191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97191]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97194]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Jan 22 22:32:31 np0005592985.novalocal sudo[97194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97194]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97197]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Jan 22 22:32:31 np0005592985.novalocal sudo[97197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97197]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97200]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Jan 22 22:32:31 np0005592985.novalocal sudo[97200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97200]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97203]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Jan 22 22:32:31 np0005592985.novalocal sudo[97203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97203]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97206]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 22:32:31 np0005592985.novalocal sudo[97206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97206]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97209]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97209]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97212]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97212]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97215]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97215]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97218]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97218]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97221]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97221]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97224]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Jan 22 22:32:31 np0005592985.novalocal sudo[97224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97224]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97227]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 22:32:31 np0005592985.novalocal sudo[97227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97227]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97230]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97230]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97233]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97233]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97236]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97236]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97239]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97239]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97242]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97242]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97245]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Jan 22 22:32:31 np0005592985.novalocal sudo[97245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97245]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97248]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Jan 22 22:32:31 np0005592985.novalocal sudo[97248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97248]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97251]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:31 np0005592985.novalocal sudo[97251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97251]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97254]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Jan 22 22:32:31 np0005592985.novalocal sudo[97254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97254]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97257]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Jan 22 22:32:31 np0005592985.novalocal sudo[97257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97257]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97260]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Jan 22 22:32:31 np0005592985.novalocal sudo[97260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:31 np0005592985.novalocal sudo[97260]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:31 np0005592985.novalocal sudo[97263]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Jan 22 22:32:31 np0005592985.novalocal sudo[97263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97263]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97266]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97266]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97269]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97269]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97272]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97272]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97275]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Jan 22 22:32:32 np0005592985.novalocal sudo[97275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97275]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97278]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97278]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97281]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Jan 22 22:32:32 np0005592985.novalocal sudo[97281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97281]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97284]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97284]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97287]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Jan 22 22:32:32 np0005592985.novalocal sudo[97287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97287]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97290]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97290]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97293]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:32 np0005592985.novalocal sudo[97293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97293]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97296]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Jan 22 22:32:32 np0005592985.novalocal sudo[97296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97296]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97299]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Jan 22 22:32:32 np0005592985.novalocal sudo[97299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97299]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97302]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Jan 22 22:32:32 np0005592985.novalocal sudo[97302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97302]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97305]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Jan 22 22:32:32 np0005592985.novalocal sudo[97305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97305]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97308]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Jan 22 22:32:32 np0005592985.novalocal sudo[97308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97308]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97311]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Jan 22 22:32:32 np0005592985.novalocal sudo[97311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97311]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97314]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Jan 22 22:32:32 np0005592985.novalocal sudo[97314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97314]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97317]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Jan 22 22:32:32 np0005592985.novalocal sudo[97317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97317]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97320]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:32 np0005592985.novalocal sudo[97320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97320]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97323]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97323]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97326]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Jan 22 22:32:32 np0005592985.novalocal sudo[97326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97326]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97329]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Jan 22 22:32:32 np0005592985.novalocal sudo[97329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97329]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97332]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97332]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97335]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97335]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:32 np0005592985.novalocal sudo[97338]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Jan 22 22:32:32 np0005592985.novalocal sudo[97338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:32 np0005592985.novalocal sudo[97338]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97341]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97341]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97344]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97344]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97347]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97347]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97350]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97350]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97353]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97353]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97356]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97356]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97359]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97359]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97362]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97362]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97365]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97365]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97368]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97368]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97371]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97371]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97374]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97374]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97377]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97377]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97380]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Jan 22 22:32:33 np0005592985.novalocal sudo[97380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97380]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97383]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Jan 22 22:32:33 np0005592985.novalocal sudo[97383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97383]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97386]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Jan 22 22:32:33 np0005592985.novalocal sudo[97386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97386]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97389]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97389]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97392]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Jan 22 22:32:33 np0005592985.novalocal sudo[97392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97392]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97395]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Jan 22 22:32:33 np0005592985.novalocal sudo[97395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97395]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97398]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Jan 22 22:32:33 np0005592985.novalocal sudo[97398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97398]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97401]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Jan 22 22:32:33 np0005592985.novalocal sudo[97401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97401]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97404]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Jan 22 22:32:33 np0005592985.novalocal sudo[97404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97404]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97407]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Jan 22 22:32:33 np0005592985.novalocal sudo[97407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97407]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97410]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Jan 22 22:32:33 np0005592985.novalocal sudo[97410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97410]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:33 np0005592985.novalocal sudo[97413]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Jan 22 22:32:33 np0005592985.novalocal sudo[97413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:33 np0005592985.novalocal sudo[97413]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97416]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Jan 22 22:32:34 np0005592985.novalocal sudo[97416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97416]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97419]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97419]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97422]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Jan 22 22:32:34 np0005592985.novalocal sudo[97422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97422]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Jan 22 22:32:34 np0005592985.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.138s CPU time. Jan 22 22:32:34 np0005592985.novalocal sudo[97425]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97425]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97428]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97428]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97431]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97431]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97434]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97434]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97437]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97437]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97440]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97440]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97443]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97443]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97446]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97446]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97449]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97449]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97452]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97452]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97455]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97455]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97458]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97458]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97461]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97461]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97464]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Jan 22 22:32:34 np0005592985.novalocal sudo[97464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97464]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97467]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Jan 22 22:32:34 np0005592985.novalocal sudo[97467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97467]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97470]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Jan 22 22:32:34 np0005592985.novalocal sudo[97470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97470]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97473]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Jan 22 22:32:34 np0005592985.novalocal sudo[97473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97473]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97476]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Jan 22 22:32:34 np0005592985.novalocal sudo[97476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97476]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97481]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97481]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97484]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Jan 22 22:32:34 np0005592985.novalocal sudo[97484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97484]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97487]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97487]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 22 22:32:34 np0005592985.novalocal systemd[1]: setroubleshootd.service: Consumed 1.203s CPU time. Jan 22 22:32:34 np0005592985.novalocal sudo[97490]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Jan 22 22:32:34 np0005592985.novalocal sudo[97490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97490]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97493]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Jan 22 22:32:34 np0005592985.novalocal sudo[97493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97493]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97496]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Jan 22 22:32:34 np0005592985.novalocal sudo[97496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:34 np0005592985.novalocal sudo[97496]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:34 np0005592985.novalocal sudo[97499]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Jan 22 22:32:35 np0005592985.novalocal sudo[97499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97499]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97502]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Jan 22 22:32:35 np0005592985.novalocal sudo[97502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97502]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97505]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Jan 22 22:32:35 np0005592985.novalocal sudo[97505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97505]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97508]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Jan 22 22:32:35 np0005592985.novalocal sudo[97508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97508]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97511]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Jan 22 22:32:35 np0005592985.novalocal sudo[97511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97511]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97514]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Jan 22 22:32:35 np0005592985.novalocal sudo[97514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97514]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97517]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Jan 22 22:32:35 np0005592985.novalocal sudo[97517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97517]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97520]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:35 np0005592985.novalocal sudo[97520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97520]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97523]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Jan 22 22:32:35 np0005592985.novalocal sudo[97523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97523]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97526]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Jan 22 22:32:35 np0005592985.novalocal sudo[97526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97526]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97529]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Jan 22 22:32:35 np0005592985.novalocal sudo[97529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97529]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97532]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Jan 22 22:32:35 np0005592985.novalocal sudo[97532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97532]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97535]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Jan 22 22:32:35 np0005592985.novalocal sudo[97535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97535]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97538]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Jan 22 22:32:35 np0005592985.novalocal sudo[97538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97538]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97541]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Jan 22 22:32:35 np0005592985.novalocal sudo[97541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97541]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97544]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Jan 22 22:32:35 np0005592985.novalocal sudo[97544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97544]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97547]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Jan 22 22:32:35 np0005592985.novalocal sudo[97547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97547]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97550]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Jan 22 22:32:35 np0005592985.novalocal sudo[97550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97550]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97553]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Jan 22 22:32:35 np0005592985.novalocal sudo[97553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97553]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97556]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Jan 22 22:32:35 np0005592985.novalocal sudo[97556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97556]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97559]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Jan 22 22:32:35 np0005592985.novalocal sudo[97559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97559]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97562]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Jan 22 22:32:35 np0005592985.novalocal sudo[97562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97562]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97565]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Jan 22 22:32:35 np0005592985.novalocal sudo[97565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97565]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97568]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Jan 22 22:32:35 np0005592985.novalocal sudo[97568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97568]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97571]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Jan 22 22:32:35 np0005592985.novalocal sudo[97571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97571]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97574]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Jan 22 22:32:35 np0005592985.novalocal sudo[97574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97574]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97577]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Jan 22 22:32:35 np0005592985.novalocal sudo[97577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97577]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97580]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Jan 22 22:32:35 np0005592985.novalocal sudo[97580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97580]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97583]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Jan 22 22:32:35 np0005592985.novalocal sudo[97583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97583]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:35 np0005592985.novalocal sudo[97586]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Jan 22 22:32:35 np0005592985.novalocal sudo[97586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:35 np0005592985.novalocal sudo[97586]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97589]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Jan 22 22:32:36 np0005592985.novalocal sudo[97589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97589]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97592]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Jan 22 22:32:36 np0005592985.novalocal sudo[97592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97592]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97595]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Jan 22 22:32:36 np0005592985.novalocal sudo[97595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97595]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97598]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Jan 22 22:32:36 np0005592985.novalocal sudo[97598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97598]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97601]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005592985.novalocal.pem Jan 22 22:32:36 np0005592985.novalocal sudo[97601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97601]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97604]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Jan 22 22:32:36 np0005592985.novalocal sudo[97604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97604]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97607]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Jan 22 22:32:36 np0005592985.novalocal sudo[97607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97607]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97610]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Jan 22 22:32:36 np0005592985.novalocal sudo[97610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97610]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97613]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Jan 22 22:32:36 np0005592985.novalocal sudo[97613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97613]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97616]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Jan 22 22:32:36 np0005592985.novalocal sudo[97616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97616]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97619]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Jan 22 22:32:36 np0005592985.novalocal sudo[97619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97619]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97622]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Jan 22 22:32:36 np0005592985.novalocal sudo[97622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97622]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97625]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Jan 22 22:32:36 np0005592985.novalocal sudo[97625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97625]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97628]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Jan 22 22:32:36 np0005592985.novalocal sudo[97628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97628]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97631]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Jan 22 22:32:36 np0005592985.novalocal sudo[97631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97631]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97634]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Jan 22 22:32:36 np0005592985.novalocal sudo[97634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97634]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97637]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Jan 22 22:32:36 np0005592985.novalocal sudo[97637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97637]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97648]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Jan 22 22:32:36 np0005592985.novalocal sudo[97648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97648]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97679]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Jan 22 22:32:36 np0005592985.novalocal sudo[97679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97679]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97682]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Jan 22 22:32:36 np0005592985.novalocal sudo[97682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97682]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97685]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Jan 22 22:32:36 np0005592985.novalocal sudo[97685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97685]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97688]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Jan 22 22:32:36 np0005592985.novalocal sudo[97688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97688]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97691]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Jan 22 22:32:36 np0005592985.novalocal sudo[97691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97691]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97694]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Jan 22 22:32:36 np0005592985.novalocal sudo[97694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97694]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97697]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Jan 22 22:32:36 np0005592985.novalocal sudo[97697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97697]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97700]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Jan 22 22:32:36 np0005592985.novalocal sudo[97700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97700]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:36 np0005592985.novalocal sudo[97703]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Jan 22 22:32:36 np0005592985.novalocal sudo[97703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:36 np0005592985.novalocal sudo[97703]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97706]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Jan 22 22:32:37 np0005592985.novalocal sudo[97706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97706]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97709]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Jan 22 22:32:37 np0005592985.novalocal sudo[97709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97709]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97712]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Jan 22 22:32:37 np0005592985.novalocal sudo[97712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97712]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97715]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./server.log Jan 22 22:32:37 np0005592985.novalocal sudo[97715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97715]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97718]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Jan 22 22:32:37 np0005592985.novalocal sudo[97718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97718]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97721]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Jan 22 22:32:37 np0005592985.novalocal sudo[97721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97721]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97724]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Jan 22 22:32:37 np0005592985.novalocal sudo[97724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97724]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97727]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Jan 22 22:32:37 np0005592985.novalocal sudo[97727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97727]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97730]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Jan 22 22:32:37 np0005592985.novalocal sudo[97730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97730]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97733]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Jan 22 22:32:37 np0005592985.novalocal sudo[97733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97733]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97736]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Jan 22 22:32:37 np0005592985.novalocal sudo[97736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97736]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97739]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Jan 22 22:32:37 np0005592985.novalocal sudo[97739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97739]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97742]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Jan 22 22:32:37 np0005592985.novalocal sudo[97742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97742]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97745]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Jan 22 22:32:37 np0005592985.novalocal sudo[97745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97745]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97748]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Jan 22 22:32:37 np0005592985.novalocal sudo[97748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97748]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97751]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Jan 22 22:32:37 np0005592985.novalocal sudo[97751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97751]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97754]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Jan 22 22:32:37 np0005592985.novalocal sudo[97754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97754]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97757]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Jan 22 22:32:37 np0005592985.novalocal sudo[97757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97757]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97760]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Jan 22 22:32:37 np0005592985.novalocal sudo[97760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97760]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97763]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Jan 22 22:32:37 np0005592985.novalocal sudo[97763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97763]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97766]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Jan 22 22:32:37 np0005592985.novalocal sudo[97766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97766]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97769]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Jan 22 22:32:37 np0005592985.novalocal sudo[97769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97769]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97772]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Jan 22 22:32:37 np0005592985.novalocal sudo[97772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97772]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97775]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Jan 22 22:32:37 np0005592985.novalocal sudo[97775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97775]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97778]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Jan 22 22:32:37 np0005592985.novalocal sudo[97778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97778]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:37 np0005592985.novalocal sudo[97781]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Jan 22 22:32:37 np0005592985.novalocal sudo[97781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:37 np0005592985.novalocal sudo[97781]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97784]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Jan 22 22:32:38 np0005592985.novalocal sudo[97784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97784]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97787]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Jan 22 22:32:38 np0005592985.novalocal sudo[97787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97787]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97790]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Jan 22 22:32:38 np0005592985.novalocal sudo[97790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97790]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97793]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Jan 22 22:32:38 np0005592985.novalocal sudo[97793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97793]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97796]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Jan 22 22:32:38 np0005592985.novalocal sudo[97796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97796]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97799]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Jan 22 22:32:38 np0005592985.novalocal sudo[97799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97799]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97802]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Jan 22 22:32:38 np0005592985.novalocal sudo[97802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97802]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97805]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Jan 22 22:32:38 np0005592985.novalocal sudo[97805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97805]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97808]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Jan 22 22:32:38 np0005592985.novalocal sudo[97808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97808]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97811]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Jan 22 22:32:38 np0005592985.novalocal sudo[97811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97811]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97814]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Jan 22 22:32:38 np0005592985.novalocal sudo[97814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97814]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97817]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Jan 22 22:32:38 np0005592985.novalocal sudo[97817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97817]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97820]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Jan 22 22:32:38 np0005592985.novalocal sudo[97820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97820]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97823]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Jan 22 22:32:38 np0005592985.novalocal sudo[97823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97823]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97826]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Jan 22 22:32:38 np0005592985.novalocal sudo[97826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97826]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97829]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Jan 22 22:32:38 np0005592985.novalocal sudo[97829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97829]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97832]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Jan 22 22:32:38 np0005592985.novalocal sudo[97832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97832]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97835]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Jan 22 22:32:38 np0005592985.novalocal sudo[97835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97835]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97838]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Jan 22 22:32:38 np0005592985.novalocal sudo[97838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97838]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97841]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Jan 22 22:32:38 np0005592985.novalocal sudo[97841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97841]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97844]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Jan 22 22:32:38 np0005592985.novalocal sudo[97844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97844]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97847]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Jan 22 22:32:38 np0005592985.novalocal sudo[97847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97847]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97850]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Jan 22 22:32:38 np0005592985.novalocal sudo[97850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97850]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97853]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Jan 22 22:32:38 np0005592985.novalocal sudo[97853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97853]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97857]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Jan 22 22:32:38 np0005592985.novalocal sudo[97857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97857]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:38 np0005592985.novalocal sudo[97860]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Jan 22 22:32:38 np0005592985.novalocal sudo[97860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:38 np0005592985.novalocal sudo[97860]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97863]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97863]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97866]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97866]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97869]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97869]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97872]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97872]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97875]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97875]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97878]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97878]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97881]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97881]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97884]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Jan 22 22:32:39 np0005592985.novalocal sudo[97884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97884]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97887]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Jan 22 22:32:39 np0005592985.novalocal sudo[97887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97887]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97890]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Jan 22 22:32:39 np0005592985.novalocal sudo[97890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97890]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97893]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97893]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97896]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97896]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97899]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97899]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97902]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97902]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97905]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97905]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97908]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97908]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97911]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Jan 22 22:32:39 np0005592985.novalocal sudo[97911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97911]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97914]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Jan 22 22:32:39 np0005592985.novalocal sudo[97914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97914]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97917]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Jan 22 22:32:39 np0005592985.novalocal sudo[97917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97917]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97920]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Jan 22 22:32:39 np0005592985.novalocal sudo[97920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97920]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97923]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Jan 22 22:32:39 np0005592985.novalocal sudo[97923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97923]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97926]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Jan 22 22:32:39 np0005592985.novalocal sudo[97926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97926]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97929]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Jan 22 22:32:39 np0005592985.novalocal sudo[97929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97929]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97932]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Jan 22 22:32:39 np0005592985.novalocal sudo[97932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97932]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97935]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Jan 22 22:32:39 np0005592985.novalocal sudo[97935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97935]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97938]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Jan 22 22:32:39 np0005592985.novalocal sudo[97938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97938]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97941]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Jan 22 22:32:39 np0005592985.novalocal sudo[97941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:39 np0005592985.novalocal sudo[97941]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:39 np0005592985.novalocal sudo[97944]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97944]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97947]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97947]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97950]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97950]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97953]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Jan 22 22:32:40 np0005592985.novalocal sudo[97953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97953]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97956]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Jan 22 22:32:40 np0005592985.novalocal sudo[97956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97956]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97959]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97959]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97962]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97962]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97965]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97965]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97968]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97968]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97971]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97971]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97974]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97974]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97977]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97977]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97980]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97980]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97983]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_show.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97983]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97986]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_list_open_vswitch.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97986]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97989]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97989]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97992]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97992]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97995]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97995]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[97998]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Jan 22 22:32:40 np0005592985.novalocal sudo[97998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[97998]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[98001]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Jan 22 22:32:40 np0005592985.novalocal sudo[98001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[98001]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[98004]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Jan 22 22:32:40 np0005592985.novalocal sudo[98004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[98004]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[98007]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Jan 22 22:32:40 np0005592985.novalocal sudo[98007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[98007]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[98010]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Jan 22 22:32:40 np0005592985.novalocal sudo[98010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[98010]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[98013]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Jan 22 22:32:40 np0005592985.novalocal sudo[98013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[98013]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[98016]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Jan 22 22:32:40 np0005592985.novalocal sudo[98016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[98016]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:40 np0005592985.novalocal sudo[98019]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Jan 22 22:32:40 np0005592985.novalocal sudo[98019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:40 np0005592985.novalocal sudo[98019]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98022]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Jan 22 22:32:41 np0005592985.novalocal sudo[98022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98022]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98025]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Jan 22 22:32:41 np0005592985.novalocal sudo[98025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98025]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98028]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Jan 22 22:32:41 np0005592985.novalocal sudo[98028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98028]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98031]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Jan 22 22:32:41 np0005592985.novalocal sudo[98031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98031]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98034]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Jan 22 22:32:41 np0005592985.novalocal sudo[98034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98034]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98037]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Jan 22 22:32:41 np0005592985.novalocal sudo[98037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98037]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98040]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Jan 22 22:32:41 np0005592985.novalocal sudo[98040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98040]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[96846]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98045]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Jan 22 22:32:41 np0005592985.novalocal sudo[98045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98045]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Jan 22 22:32:41 np0005592985.novalocal sudo[98048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98051]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Jan 22 22:32:41 np0005592985.novalocal sudo[98051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98051]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98054]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Jan 22 22:32:41 np0005592985.novalocal sudo[98054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98054]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98057]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Jan 22 22:32:41 np0005592985.novalocal sudo[98057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98057]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98060]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Jan 22 22:32:41 np0005592985.novalocal sudo[98060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98060]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98063]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Jan 22 22:32:41 np0005592985.novalocal sudo[98063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98063]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98066]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Jan 22 22:32:41 np0005592985.novalocal sudo[98066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98066]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98069]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Jan 22 22:32:41 np0005592985.novalocal sudo[98069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98069]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98072]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Jan 22 22:32:41 np0005592985.novalocal sudo[98072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98072]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98075]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Jan 22 22:32:41 np0005592985.novalocal sudo[98075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98075]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98078]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Jan 22 22:32:41 np0005592985.novalocal sudo[98078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98078]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98081]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Jan 22 22:32:41 np0005592985.novalocal sudo[98081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98081]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98084]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Jan 22 22:32:41 np0005592985.novalocal sudo[98084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98084]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98087]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Jan 22 22:32:41 np0005592985.novalocal sudo[98087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98087]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:41 np0005592985.novalocal sudo[98090]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Jan 22 22:32:41 np0005592985.novalocal sudo[98090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:41 np0005592985.novalocal sudo[98090]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98093]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98093]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98096]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98096]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98099]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98099]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98102]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98102]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98105]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98105]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98108]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98108]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98111]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98111]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98114]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98114]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98117]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98117]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98120]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98120]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98123]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98123]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98126]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98126]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98129]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Jan 22 22:32:42 np0005592985.novalocal sudo[98129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98129]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98048]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98133]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260122_222841.log /var/log/weirdo-project/logs/puppet-20260122_222841.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98133]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98136]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet.log /var/log/weirdo-project/logs/puppet.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98136]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98139]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98139]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98142]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98142]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98145]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98145]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98148]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98148]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98151]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98151]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98154]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98157]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:42 np0005592985.novalocal sudo[98157]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:42 np0005592985.novalocal sudo[98160]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Jan 22 22:32:42 np0005592985.novalocal sudo[98160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98160]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98163]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98163]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98166]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98166]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98169]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98169]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98172]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98172]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98175]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98175]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98178]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98181]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98184]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/server.log /var/log/weirdo-project/logs/neutron/server.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98184]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98187]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98187]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98190]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98190]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98193]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98193]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98196]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98196]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98199]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98202]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98202]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98205]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98205]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98208]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98208]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98211]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98211]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98214]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98214]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98217]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98217]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98220]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98220]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98223]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98226]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98229]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98232]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98235]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:43 np0005592985.novalocal sudo[98235]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:43 np0005592985.novalocal sudo[98238]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Jan 22 22:32:43 np0005592985.novalocal sudo[98238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98238]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98241]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98244]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98247]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98250]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98253]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98253]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98256]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98259]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98262]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98265]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98269]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98269]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98272]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98272]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98275]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98275]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98278]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98278]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98281]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98281]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98284]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98284]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98287]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98287]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98290]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98290]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98293]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98296]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98300]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98300]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98304]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98304]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98307]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98307]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98310]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98310]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98313]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98313]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:44 np0005592985.novalocal sudo[98316]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Jan 22 22:32:44 np0005592985.novalocal sudo[98316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:44 np0005592985.novalocal sudo[98316]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98319]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98319]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98322]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98322]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98325]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98325]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98328]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98328]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98331]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98331]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98334]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98334]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98337]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98337]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98340]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98340]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98344]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98347]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98350]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98353]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98356]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98359]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98362]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98365]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98368]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98371]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98374]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98377]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98380]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98380]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:45 np0005592985.novalocal sudo[98383]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Jan 22 22:32:45 np0005592985.novalocal sudo[98383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:45 np0005592985.novalocal sudo[98383]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98386]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98389]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98392]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98395]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98398]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98401]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98404]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98407]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98410]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98413]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98416]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98419]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98422]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98425]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98428]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98431]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98434]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98437]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98437]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:46 np0005592985.novalocal sudo[98440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Jan 22 22:32:46 np0005592985.novalocal sudo[98440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:46 np0005592985.novalocal sudo[98440]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98443]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98446]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98446]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98449]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98452]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98455]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98455]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98458]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98458]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98461]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98461]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98464]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98464]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98467]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98467]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98470]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98473]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98476]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98479]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98479]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98482]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98485]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98488]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98491]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98494]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98494]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98497]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98500]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98500]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98503]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98503]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98506]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98506]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98509]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:47 np0005592985.novalocal sudo[98512]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Jan 22 22:32:47 np0005592985.novalocal sudo[98512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:47 np0005592985.novalocal sudo[98512]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98515]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98518]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98518]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98521]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98521]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98524]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98524]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98527]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98527]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98530]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98530]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98533]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98533]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98536]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98536]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98539]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98539]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98542]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98542]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98545]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98545]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98548]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98548]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98551]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98551]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98554]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98554]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98557]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98557]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98560]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98560]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98563]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98563]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98566]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98566]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98569]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98569]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98572]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98575]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98578]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98581]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:48 np0005592985.novalocal sudo[98584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Jan 22 22:32:48 np0005592985.novalocal sudo[98584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:48 np0005592985.novalocal sudo[98584]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98587]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98590]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98593]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98596]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98596]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98599]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98602]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98605]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98608]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98608]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98611]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98611]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98614]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98614]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98617]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98620]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98623]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98626]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98626]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98629]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98629]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98632]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98632]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98635]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98638]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98641]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98644]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98644]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98647]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98647]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98650]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98650]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98653]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Jan 22 22:32:49 np0005592985.novalocal sudo[98653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:49 np0005592985.novalocal sudo[98653]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:49 np0005592985.novalocal sudo[98656]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98656]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98659]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98659]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98662]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98662]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98665]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98665]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98668]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98671]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98674]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98677]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98677]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98680]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98680]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98683]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98683]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98686]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98686]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98689]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98689]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98692]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98692]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98695]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98695]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98698]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98698]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98701]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98701]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98704]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98704]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98707]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98707]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98710]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98713]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98716]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98716]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98719]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98719]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98722]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98722]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:50 np0005592985.novalocal sudo[98725]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Jan 22 22:32:50 np0005592985.novalocal sudo[98725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:50 np0005592985.novalocal sudo[98725]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98728]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98728]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98731]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98731]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98734]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98734]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98737]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98737]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98740]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98740]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98743]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98743]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98746]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98746]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98749]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98749]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98752]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98752]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98755]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98755]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98758]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98758]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98761]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98761]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98764]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98764]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98767]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98767]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98770]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98770]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98773]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98773]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98776]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98776]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98779]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98779]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98782]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98782]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98785]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98785]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98788]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98788]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98791]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98791]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98794]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98794]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:51 np0005592985.novalocal sudo[98797]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Jan 22 22:32:51 np0005592985.novalocal sudo[98797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:51 np0005592985.novalocal sudo[98797]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98800]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98800]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98803]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98803]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98806]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98806]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98809]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98809]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98812]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98812]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98815]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98815]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98818]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98818]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98821]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98821]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98824]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98824]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98827]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98827]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98830]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005592985.novalocal.pem.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98830]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98833]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98833]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98836]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98839]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98839]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98842]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98842]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98845]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98845]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98848]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98848]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98851]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98851]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98854]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98854]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98857]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98857]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98860]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98860]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98863]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98863]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98866]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98866]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98869]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98869]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98872]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Jan 22 22:32:52 np0005592985.novalocal sudo[98872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:52 np0005592985.novalocal sudo[98872]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:52 np0005592985.novalocal sudo[98875]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98875]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98878]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98878]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98881]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98881]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98884]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98884]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98887]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98887]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98890]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98890]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98893]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98893]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98896]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98896]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98899]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98899]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98902]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98902]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98905]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98905]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98908]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98908]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98911]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98911]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98914]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98914]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98917]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98917]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98920]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98920]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98923]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98923]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98926]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98926]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98929]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98929]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98932]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98932]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98935]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98935]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98938]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98938]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98941]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98941]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:53 np0005592985.novalocal sudo[98944]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Jan 22 22:32:53 np0005592985.novalocal sudo[98944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:53 np0005592985.novalocal sudo[98944]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98947]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98947]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98950]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98950]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98953]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98953]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98956]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98956]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98959]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98959]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98962]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98962]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98965]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98965]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98968]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98968]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98971]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98971]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98974]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98974]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98977]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98977]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98980]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98980]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98983]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98983]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98986]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98986]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98989]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98989]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98992]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98992]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[98995]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[98995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[98995]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[99000]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[99000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[99000]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[99003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[99003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[99003]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[99006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[99006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[99006]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[99009]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[99009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[99009]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[99012]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Jan 22 22:32:54 np0005592985.novalocal sudo[99012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[99012]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:54 np0005592985.novalocal sudo[99015]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Jan 22 22:32:54 np0005592985.novalocal sudo[99015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:54 np0005592985.novalocal sudo[99015]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99018]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99018]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99021]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99021]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99024]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99024]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99027]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99027]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99030]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005592985.novalocal.pem.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99030]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99033]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99036]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99039]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99039]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99042]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99042]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99045]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99045]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99048]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99051]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99054]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99057]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99060]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99063]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99066]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99066]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99069]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99069]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99072]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99072]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99075]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99075]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99078]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99078]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99081]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99081]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99084]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99084]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:55 np0005592985.novalocal sudo[99087]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Jan 22 22:32:55 np0005592985.novalocal sudo[99087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:55 np0005592985.novalocal sudo[99087]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99090]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99090]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99093]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99093]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99096]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99099]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99102]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99105]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99108]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99108]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99111]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005592985.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005592985.novalocal.pem.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99111]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99114]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99114]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99117]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99120]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99123]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99126]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99129]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99129]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99132]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99135]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99138]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Jan 22 22:32:56 np0005592985.novalocal sudo[99141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Jan 22 22:32:56 np0005592985.novalocal sudo[99141]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[95966]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:56 np0005592985.novalocal sudo[99245]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zpnappmadrhnbwprfwmvxustscsztkuh ; /usr/bin/python3' Jan 22 22:32:57 np0005592985.novalocal sudo[99245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:57 np0005592985.novalocal python3[99247]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:57 np0005592985.novalocal sudo[99245]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:57 np0005592985.novalocal sudo[99252]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fxbofkulcrsjhabwzsinslugufifwuxb ; /usr/bin/python3' Jan 22 22:32:57 np0005592985.novalocal sudo[99252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:57 np0005592985.novalocal python3[99255]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:57 np0005592985.novalocal sudo[99252]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:57 np0005592985.novalocal sudo[99260]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mziyvmmeaimkxriftdqzzmldclcckvij ; /usr/bin/python3' Jan 22 22:32:57 np0005592985.novalocal sudo[99260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:57 np0005592985.novalocal python3[99262]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:57 np0005592985.novalocal sudo[99260]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:57 np0005592985.novalocal sudo[99267]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qzagwxtmrzyvmloiwdjnwqhlubvdhtdu ; /usr/bin/python3' Jan 22 22:32:57 np0005592985.novalocal sudo[99267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:57 np0005592985.novalocal python3[99269]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:57 np0005592985.novalocal sudo[99267]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:58 np0005592985.novalocal sudo[99274]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-clehxgdourokhgxmhcfsdibiidnyznic ; /usr/bin/python3' Jan 22 22:32:58 np0005592985.novalocal sudo[99274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:58 np0005592985.novalocal python3[99276]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:58 np0005592985.novalocal sudo[99274]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:58 np0005592985.novalocal sudo[99281]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-btcrdigxvoghcbdlgqdyzbscwcezfkgv ; /usr/bin/python3' Jan 22 22:32:58 np0005592985.novalocal sudo[99281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:58 np0005592985.novalocal python3[99283]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:58 np0005592985.novalocal sudo[99281]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:58 np0005592985.novalocal sudo[99288]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wipyumxhwuieyptssfaohxjcvnqjdvtk ; /usr/bin/python3' Jan 22 22:32:58 np0005592985.novalocal sudo[99288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:58 np0005592985.novalocal python3[99290]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:58 np0005592985.novalocal sudo[99288]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:58 np0005592985.novalocal sudo[99295]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mxybkasiklydyrlpjfhzctjzlqfpumqa ; /usr/bin/python3' Jan 22 22:32:58 np0005592985.novalocal sudo[99295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:58 np0005592985.novalocal python3[99297]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:59 np0005592985.novalocal sudo[99295]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:59 np0005592985.novalocal sudo[99302]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aawdxnrptsrayfszusasaflkediamyyi ; /usr/bin/python3' Jan 22 22:32:59 np0005592985.novalocal sudo[99302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:59 np0005592985.novalocal python3[99304]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:59 np0005592985.novalocal sudo[99302]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:59 np0005592985.novalocal sudo[99309]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ulhdeqitzdodaipwyzdmvjsbrncjjarf ; /usr/bin/python3' Jan 22 22:32:59 np0005592985.novalocal sudo[99309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:59 np0005592985.novalocal python3[99311]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 22 22:32:59 np0005592985.novalocal sudo[99309]: pam_unix(sudo:session): session closed for user root Jan 22 22:32:59 np0005592985.novalocal sudo[99316]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fquxqkbdollqkytaldqzruivhwcnhuaf ; /usr/bin/python3' Jan 22 22:32:59 np0005592985.novalocal sudo[99316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Jan 22 22:32:59 np0005592985.novalocal python3[99318]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None